| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2022-47388 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:56:44 | Deep Dive |
| CVE-2022-47387 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:54:42 | Deep Dive |
| CVE-2022-47386 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:49:05 | Deep Dive |
| CVE-2022-47385 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:47:18 | Deep Dive |
| CVE-2022-47384 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:46:29 | Deep Dive |
| CVE-2022-47383 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:44:53 | Deep Dive |
| CVE-2022-47382 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:42:48 | Deep Dive |
| CVE-2022-47381 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:41:52 | Deep Dive |
| CVE-2022-47380 | CODESYS: Multiple products prone to out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:40:45 | Deep Dive |
| CVE-2022-47379 | CODESYS: Multiple products prone to out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:33:42 | Deep Dive |
| CVE-2022-47378 | CODESYS: Multiple products prone to Improper Input Validation | CODESYS | CODESYS Control RTE (SL) | Medium | 6.5 | 2023-05-15 09:30:22 | Deep Dive |
| CVE-2022-22508 | CODESYS V3: Improper Input Validation | CODESYS V3 | CODESYS Control RTE (SL) | Medium | 4.3 | 2023-05-15 09:27:39 | Deep Dive |
| CVE-2022-4224 | CODESYS: Exposure of Resource to Wrong Sphere in CODESYS V3 | CODESYS | Control RTE (SL) | High | 8.8 | 2023-03-23 11:15:37 | Deep Dive |
| CVE-2022-30792 | CODESYS: CmpChannelServer, CmpChannelServerEmbedded allow unauthenticated attackers to block all their available communication channels | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-07-11 10:40:44 | Deep Dive |
| CVE-2022-30791 | CODESYS V3: CmpBlkDrvTcp allows unauthenticated attackers to block all its available TCP connections | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-07-11 10:40:39 | Deep Dive |
| CVE-2022-22519 | Special HTTP(s) Requests can cause a buffer-read causing a crash of the webserver and the runtime system. | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-04-07 18:21:24 | Deep Dive |
| CVE-2022-22518 | A bug in the CODESYS V3 CmpUserMgr component fails to correctly apply a security policy. | CODESYS | CODESYS Control for BeagleBone SL | Medium | 6.5 | 2022-04-07 18:21:22 | Deep Dive |
| CVE-2022-22517 | Communication Components in multiple CODESYS products vulnerable to communication channel disruption | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-04-07 18:21:20 | Deep Dive |
| CVE-2022-22516 | CODESYS driver SysDrv3S allows SYSTEM users on Microsoft Windows to read and write in restricted memory space. | CODESYS | CODESYS Control RTE (SL) | High | 7.8 | 2022-04-07 18:21:18 | Deep Dive |
| CVE-2022-22515 | A component of the CODESYS Control runtime system allows read and write access to configuration files | CODESYS | CODESYS Control RTE (SL) | High | 8.1 | 2022-04-07 18:21:16 | Deep Dive |