Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
codesys runtime toolkit vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-34593
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be block...
Codesys Plcwinnt
Codesys Runtime Toolkit
8.1
CVSSv3
CVE-2021-34595
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
Codesys Plcwinnt
Codesys Runtime Toolkit
6.5
CVSSv3
CVE-2021-34596
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
Codesys Plcwinnt
Codesys Runtime Toolkit
9.8
CVSSv3
CVE-2022-31806
In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.
Codesys Runtime Toolkit
Codesys Plcwinnt
1 Github repository
8.1
CVSSv3
CVE-2022-1965
Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.
Codesys Runtime Toolkit
Codesys Plcwinnt
6.5
CVSSv3
CVE-2022-32140
Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required.
Codesys Runtime Toolkit
Codesys Plcwinnt
5.3
CVSSv3
CVE-2021-30187
CODESYS V2 runtime system SP prior to 2.4.7.55 has Improper Neutralization of Special Elements used in an OS Command.
Codesys Runtime Toolkit
7.5
CVSSv3
CVE-2021-33486
All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions.
Codesys Runtime Toolkit
6.5
CVSSv3
CVE-2019-19789
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.
Codesys Sp Realtime Nt
Codesys Plcwinnt
Codesys Runtime Toolkit
9.8
CVSSv3
CVE-2021-33485
CODESYS Control Runtime system prior to 3.5.17.10 has a Heap-based Buffer Overflow.
Codesys Control Win Sl
Codesys Control Runtime System Toolkit
Codesys Embedded Target Visu Toolkit
Codesys Hmi
Codesys Remote Target Visu Toolkit
Codesys Control Rte
Codesys Control
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »