|ID||CVSS||Summary||Last (major) update||Published|
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 126.96.36.199 to 188.8.131.52, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condit
|09-10-2019 - 23:46||17-09-2019 - 19:15|
An issue was discovered in 3S-Smart CODESYS before 184.108.40.206 . Crafted network packets cause the Control Runtime to crash.
|18-09-2019 - 19:15||17-09-2019 - 16:15|
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all
|30-08-2019 - 11:42||15-08-2019 - 17:15|
3S-Smart CODESYS SP Realtime NT before V220.127.116.11, CODESYS Runtime Toolkit 32 bit full before V18.104.22.168, and CODESYS PLCWinNT before V22.214.171.124 allow a NULL pointer dereference.
|20-12-2019 - 13:15||20-12-2019 - 13:15|
An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 126.96.36.199. A specially crafted network request can cause remote code execution. An attacker can send a malicious pack
|07-05-2020 - 13:54||07-05-2020 - 13:15|