Total vulnerabilities in the database
Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.
Software | From | Fixed in |
---|---|---|
codesys / runtime_toolkit | 2.0 | 2.4.7.57 |
codesys / plcwinnt | 2.0 | 2.4.7.57 |