Total vulnerabilities in the database
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
Software | From | Fixed in |
---|---|---|
codesys / control_for_beaglebone_sl | - | 4.5.0.0 |
codesys / control_for_beckhoff_cx9020 | - | 4.5.0.0 |
codesys / control_for_empc-a/imx6_sl | - | 4.5.0.0 |
codesys / control_for_iot2000_sl | - | 4.5.0.0 |
codesys / control_for_linux_sl | - | 4.5.0.0 |
codesys / control_for_pfc100_sl | - | 4.5.0.0 |
codesys / control_for_pfc200_sl | - | 4.5.0.0 |
codesys / control_for_plcnext_sl | - | 4.5.0.0 |
codesys / control_for_raspberry_pi_sl | - | 4.5.0.0 |
codesys / control_for_wago_touch_panels_600_sl | - | 4.5.0.0 |
codesys / control_rte_sl | - | 3.5.18.0 |
codesys / control_rte_sl_(for_beckhoff_cx) | - | 3.5.18.0 |
codesys / control_win_sl | - | 3.5.18.0 |
codesys / control_runtime_system_toolkit | - | 3.5.18.0 |
codesys / embedded_target_visu_toolkit | - | 3.5.18.0 |
codesys / hmi_sl | - | 3.5.18.0 |
codesys / remote_target_visu_toolkit | - | 3.5.18.0 |
codesys / development_system | 3.0 | 3.5.18.0 |