Vulnerabilities > 3S Software > Codesys Runtime System

DATE CVE VULNERABILITY TITLE RISK
2018-02-15 CVE-2018-5440 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in 3S-Software Codesys Runtime System and Codesys web Server
A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server.
network
low complexity
3s-software CWE-119
7.5
2015-10-18 CVE-2015-6482 Remote Denial of Service vulnerability in CODESYS Runtime Toolkit
Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request.
network
low complexity
3s-software
5.0
2014-04-25 CVE-2014-0769 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
9.3
2014-04-25 CVE-2014-0760 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
9.3
2013-01-21 CVE-2012-6069 Path Traversal vulnerability in 3S-Software Codesys Runtime System
Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a ..
network
low complexity
3s-software CWE-22
critical
10.0
2013-01-21 CVE-2012-6068 Permissions, Privileges, and Access Controls vulnerability in 3S-Software Codesys Runtime System
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service.
network
low complexity
3s-software CWE-264
critical
10.0