Vulnerabilities > 3S Software > Codesys Runtime System
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-02-15 | CVE-2018-5440 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in 3S-Software Codesys Runtime System and Codesys web Server A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. | 7.5 |
2015-10-18 | CVE-2015-6482 | Remote Denial of Service vulnerability in CODESYS Runtime Toolkit Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request. | 5.0 |
2014-04-25 | CVE-2014-0769 | Improper Authentication vulnerability in multiple products The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001. | 9.3 |
2014-04-25 | CVE-2014-0760 | Improper Authentication vulnerability in multiple products The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. | 9.3 |
2013-01-21 | CVE-2012-6069 | Path Traversal vulnerability in 3S-Software Codesys Runtime System Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. | 10.0 |
2013-01-21 | CVE-2012-6068 | Permissions, Privileges, and Access Controls vulnerability in 3S-Software Codesys Runtime System The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service. | 10.0 |