Total vulnerabilities in the database
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
Software | From | Fixed in |
---|---|---|
codesys / runtime_toolkit | - | 3.5.19.50 |
codesys / control_for_wago_touch_panels_600_sl | - | 4.11.0.0 |
codesys / control_for_raspberry_pi_sl | - | 4.11.0.0 |
codesys / control_for_pfc200_sl | - | 4.11.0.0 |
codesys / control_for_plcnext_sl | - | 4.11.0.0 |
codesys / control_for_pfc100_sl | - | 4.11.0.0 |
codesys / control_for_linux_sl | - | 4.11.0.0 |
codesys / control_for_linux_arm_sl | - | 4.11.0.0 |
codesys / control_for_empc-a/imx6 | - | 4.11.0.0 |
codesys / control_for_iot2000_sl | - | 4.11.0.0 |
codesys / control_for_beaglebone_sl | - | 4.11.0.0 |