Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Control_for_pfc200
(Codesys)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 12 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-09-17 | CVE-2019-13542 | 3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition. | Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_win, Linux, Runtime_system_toolkit | N/A | ||
2019-09-13 | CVE-2019-13532 | CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller. | Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_linux, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_runtime_system_toolkit, Control_win, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit | N/A |