Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:codesys:simulation_runtime:3.0.0.0:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2018-25048 |
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device. Published: March 23, 2023; 7:15:12 AM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2021-29242 |
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. Published: May 03, 2021; 10:15:07 AM -0400 |
V3.1: 7.3 HIGH V2.0: 7.5 HIGH |
CVE-2019-9009 |
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash. Published: September 17, 2019; 12:15:11 PM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2019-9008 |
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime. Published: September 17, 2019; 10:15:10 AM -0400 |
V3.1: 8.8 HIGH V2.0: 6.5 MEDIUM |