Product:

Control_for_linux_arm_sl

(Codesys)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2021-05-03 CVE-2021-29242 CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte, Control_runtime_system_toolkit, Control_win, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Opc_server, Plchandler, Remote_target_visu_toolkit, Safety_sil, Simulation_runtime 7.3
2023-12-05 CVE-2023-6357 A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device. Control_for_beaglebone_sl, Control_for_empc\-A\/imx6, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Runtime_toolkit N/A