6 matches found
CVE-2012-6068
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
CVE-2012-6069
The CoDeSys Runtime Toolkit’s file transfer functionality does notperform input validation, which allows an attacker to access files anddirectories outside the intended scope. This may allow an attacker toupload and download any file on the device. This could allow theattacker to affect the availab...
CVE-2014-0769
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 o...
CVE-2014-0760
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1Modular Controller with CoDeSys and SoftMotion provide an undocumentedaccess method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (applicationcrash) via u...
CVE-2015-6482
Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request.
CVE-2018-5440
A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19. A crafted request may cause a b...