Filtered by vendor Codesys
Subscribe
Total
84 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-30186 | 1 Codesys | 2 Plcwinnt, Runtime Toolkit | 2021-05-26 | 5.0 MEDIUM | 7.5 HIGH |
CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow. | |||||
CVE-2021-30195 | 1 Codesys | 2 Plcwinnt, Runtime Toolkit | 2021-05-26 | 5.0 MEDIUM | 7.5 HIGH |
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation. | |||||
CVE-2021-30188 | 1 Codesys | 1 V2 Runtime System Sp | 2021-05-26 | 7.5 HIGH | 9.8 CRITICAL |
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. | |||||
CVE-2021-30189 | 1 Codesys | 1 V2 Web Server | 2021-05-26 | 7.5 HIGH | 9.8 CRITICAL |
CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow. | |||||
CVE-2021-30191 | 1 Codesys | 1 V2 Web Server | 2021-05-26 | 5.0 MEDIUM | 7.5 HIGH |
CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input. | |||||
CVE-2021-30193 | 1 Codesys | 1 V2 Web Server | 2021-05-26 | 7.5 HIGH | 9.8 CRITICAL |
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write. | |||||
CVE-2021-30194 | 1 Codesys | 1 V2 Web Server | 2021-05-25 | 6.4 MEDIUM | 9.1 CRITICAL |
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read. | |||||
CVE-2021-29240 | 1 Codesys | 1 Development System | 2021-05-11 | 6.8 MEDIUM | 7.8 HIGH |
The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content. | |||||
CVE-2021-29238 | 1 Codesys | 1 Automation Server | 2021-05-11 | 6.8 MEDIUM | 8.8 HIGH |
CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF). | |||||
CVE-2021-29239 | 1 Codesys | 1 Development System | 2021-05-07 | 4.6 MEDIUM | 7.8 HIGH |
CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity. | |||||
CVE-2019-9013 | 1 Codesys | 12 Control For Beaglebone Sl, Control For Empc-a\/imx6 Sl, Control For Iot2000 Sl and 9 more | 2020-08-24 | 5.8 MEDIUM | 8.8 HIGH |
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3. | |||||
CVE-2019-9012 | 1 Codesys | 10 Control For Beaglebone Sl, Control For Empc-a\/imx6 Sl, Control For Iot2000 Sl and 7 more | 2020-08-24 | 7.8 HIGH | 7.5 HIGH |
An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System. | |||||
CVE-2018-20026 | 1 Codesys | 18 Control For Beaglebone Sl, Control For Empc-a\/imx6 Sl, Control For Iot2000 Sl and 15 more | 2020-08-24 | 5.0 MEDIUM | 7.5 HIGH |
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0. | |||||
CVE-2020-10245 | 1 Codesys | 14 Control For Beaglebone, Control For Empc-a\/imx6, Control For Iot2000 and 11 more | 2020-04-01 | 10.0 HIGH | 9.8 CRITICAL |
CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow. | |||||
CVE-2019-9008 | 1 Codesys | 10 Control For Beaglebone, Control For Empc-a\/imx6, Control For Iot2000 and 7 more | 2020-03-11 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime. | |||||
CVE-2019-19789 | 1 Codesys | 3 Plcwinnt, Runtime Toolkit, Sp Realtime Nt | 2020-01-03 | 4.0 MEDIUM | 6.5 MEDIUM |
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference. | |||||
CVE-2019-18858 | 1 Codesys | 14 Control For Beaglebone, Control For Empc-a\/imx6, Control For Iot2000 and 11 more | 2019-11-22 | 7.5 HIGH | 9.8 CRITICAL |
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow. | |||||
CVE-2019-16265 | 1 Codesys | 2 Codesys, Eni Server | 2019-10-28 | 7.5 HIGH | 9.8 CRITICAL |
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow. | |||||
CVE-2019-13532 | 1 Codesys | 13 Control For Beaglebone, Control For Empc-a\/imx6, Control For Iot2000 and 10 more | 2019-10-09 | 5.0 MEDIUM | 7.5 HIGH |
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller. | |||||
CVE-2019-13542 | 1 Codesys | 10 Control For Beaglebone, Control For Empc-a\/imx6, Control For Iot2000 and 7 more | 2019-10-09 | 4.0 MEDIUM | 6.5 MEDIUM |
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition. |