Show filters
132 Total Results
Displaying 111-120 of 132
Sort by:
Attacker Value
Unknown
CVE-2020-15806
Disclosure Date: July 22, 2020 (last updated February 21, 2025)
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.
0
Attacker Value
Unknown
CVE-2020-12068
Disclosure Date: May 14, 2020 (last updated November 27, 2024)
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.
0
Attacker Value
Unknown
CVE-2020-6081
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-5105
Disclosure Date: March 26, 2020 (last updated February 21, 2025)
An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 …
0
Attacker Value
Unknown
CVE-2020-7052
Disclosure Date: January 24, 2020 (last updated February 21, 2025)
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
0
Attacker Value
Unknown
CVE-2019-19789
Disclosure Date: December 20, 2019 (last updated November 27, 2024)
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2019-18858
Disclosure Date: November 20, 2019 (last updated November 27, 2024)
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
0
Attacker Value
Unknown
CVE-2019-16265
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.
0
Attacker Value
Unknown
CVE-2019-13538
Disclosure Date: September 17, 2019 (last updated November 27, 2024)
3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only.
0
Attacker Value
Unknown
CVE-2019-13542
Disclosure Date: September 17, 2019 (last updated November 27, 2024)
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
0