Total vulnerabilities in the database
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Software | From | Fixed in |
---|---|---|
codesys / runtime_plcwinnt | 2.0.0.0 | 2.4.7.52 |
codesys / remote_target_visu_toolkit | 3.0 | 3.5.12.30 |
codesys / embedded_target_visu_toolkit | 3.0 | 3.5.12.30 |
codesys / runtime_system_toolkit | 2.0.0.0 | 2.4.7.52 |
codesys / runtime_system_toolkit | 3.5.15.0 | 3.5.15.0.x |
codesys / control_v3_runtime_system_toolkit | 3.0.0.0 | 3.5.12.30 |
codesys / simulation_runtime | 3.0.0.0 | 3.5.12.30 |
codesys / control_win | 3.0.0.0 | 3.5.12.30 |
codesys / control_rte | 3.0.0.0 | 3.5.12.30 |
codesys / hmi | 3.0 | 3.5.12.30 |
codesys / control_for_raspberry_pi | 3.0.0.0 | 3.5.12.30 |
codesys / control_for_pfc200 | 3.0.0.0 | 3.5.12.30 |
codesys / control_for_pfc100 | 3.0.0.0 | 3.5.12.30 |
codesys / control_for_iot2000 | 3.0.0.0 | 3.5.12.30 |
codesys / control_for_empc-a/imx6 | 3.0.0.0 | 3.5.12.30 |
codesys / control_for_beaglebone | 3.0.0.0 | 3.5.12.30 |