|ID||CVSS||Summary||Last (major) update||Published|
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 22.214.171.124 to 126.96.36.199, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condit
|09-10-2019 - 23:46||17-09-2019 - 19:15|
CODESYS V3 web server, all versions prior to 188.8.131.52, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
|09-10-2019 - 23:46||13-09-2019 - 17:15|
CODESYS V3 web server, all versions prior to 184.108.40.206, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.
|28-10-2021 - 15:08||13-09-2019 - 17:15|
CODESYS 3 web server before 220.127.116.11, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
|22-11-2019 - 16:51||20-11-2019 - 18:15|
An issue was discovered in 3S-Smart CODESYS before 18.104.22.168 . Crafted network packets cause the Control Runtime to crash.
|01-01-2022 - 20:19||17-09-2019 - 16:15|
An issue was discovered in 3S-Smart CODESYS V3 through 22.214.171.124. A user with low privileges can take full control over the runtime.
|11-03-2020 - 22:28||17-09-2019 - 14:15|