Total vulnerabilities in the database
In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.
Software | From | Fixed in |
---|---|---|
codesys / hmi_(sl) | - | 3.5.18.40 |
codesys / control_win_(sl) | - | 3.5.18.40 |
codesys / control_runtime_system_toolkit | - | 3.5.18.40 |
codesys / control_rte_(sl) | - | 3.5.18.40 |
codesys / control_rte_(for_beckhoff_cx)_sl | - | 3.5.18.40 |
codesys / control_for_wago_touch_panels_600_sl | - | 4.7.0.0 |
codesys / control_for_raspberry_pi_sl | - | 4.7.0.0 |
codesys / control_for_plcnext_sl | - | 4.7.0.0 |
codesys / control_for_pfc200_sl | - | 4.7.0.0 |
codesys / control_for_pfc100_sl | - | 4.7.0.0 |
codesys / control_for_linux_sl | - | 4.7.0.0 |
codesys / control_for_iot2000_sl | - | 4.7.0.0 |
codesys / control_for_empc-a/imx6_sl | - | 4.7.0.0 |
codesys / control_for_beaglebone_sl | - | 4.7.0.0 |