| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2018-25048 | Codesys Runtime Improper Limitation of a Pathname | CODESYS | Control for BeagleBone | High | 8.8 | 2023-03-23 10:45:37 | Deep Dive |
| CVE-2020-12069 | CODESYS V3 prone to Inadequate Password Hashing | CODESYS | CODESYS V3 containing the CmpUserMgr | High | 7.8 | 2022-12-26 00:00:00 | Deep Dive |
| CVE-2022-1989 | CODESYS Visualization vulnerable to user enumeration | CODESYS | CODESYS Visualization | Medium | 5.3 | 2022-08-23 09:55:30 | Deep Dive |
| CVE-2022-30792 | CODESYS: CmpChannelServer, CmpChannelServerEmbedded allow unauthenticated attackers to block all their available communication channels | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-07-11 10:40:44 | Deep Dive |
| CVE-2022-30791 | CODESYS V3: CmpBlkDrvTcp allows unauthenticated attackers to block all its available TCP connections | CODESYS | CODESYS Control RTE (SL) | High | 7.5 | 2022-07-11 10:40:39 | Deep Dive |
| CVE-2022-1794 | Plaintext Storage of a password in CODESYS V3 OPC DA Server | CODESYS | CODESYS OPC DA Server | Medium | 5.5 | 2022-07-11 10:40:28 | Deep Dive |
| CVE-2022-32143 | CODESYS runtime system prone to directory acces | CODESYS | Runtime Toolkit | High | 8.8 | 2022-06-24 07:46:30 | Deep Dive |
| CVE-2022-32142 | CODESYS runtime system prone to denial of service due to use of out of range pointer | CODESYS | Runtime Toolkit | High | 8.1 | 2022-06-24 07:46:28 | Deep Dive |
| CVE-2022-32141 | CODESYS runtime system prone to denial of service due to buffer over read | CODESYS | Runtime Toolkit | Medium | 6.5 | 2022-06-24 07:46:27 | Deep Dive |
| CVE-2022-32140 | CODESYS runtime system prone to denial of service due to buffer copy | CODESYS | Runtime Toolkit | Medium | 6.5 | 2022-06-24 07:46:25 | Deep Dive |
| CVE-2022-32139 | CODESYS runtime system prone to denial of service due to out of bounds read | CODESYS | Runtime Toolkit | Medium | 6.5 | 2022-06-24 07:46:23 | Deep Dive |
| CVE-2022-32138 | CODESYS runtime system prone to denial of service due to Unexpected Sign Extension | CODESYS | Runtime Toolkit | High | 8.8 | 2022-06-24 07:46:22 | Deep Dive |
| CVE-2022-32137 | CODESYS Runtime System prone to heap based buffer overflow | CODESYS | Runtime Toolkit | High | 8.8 | 2022-06-24 07:46:20 | Deep Dive |
| CVE-2022-32136 | Codesys runtime systems: Access of uninitialised pointer lead to denial of service. | CODESYS | Runtime Toolkit | Medium | 6.5 | 2022-06-24 07:46:19 | Deep Dive |
| CVE-2022-31806 | Insecure default settings in CODESYS Runtime Toolkit 32 bit full and CODESYS PLCWinNT | CODESYS | CODESYS PLCWinNT | Critical | 9.8 | 2022-06-24 07:46:17 | Deep Dive |
| CVE-2022-31805 | Insecure transmission of credentials | CODESYS | CODESYS Development System | High | 7.5 | 2022-06-24 07:46:15 | Deep Dive |
| CVE-2022-31804 | CODESYS Gateway server prone to denial of service attack due to excessive memory allocation | CODESYS | CODESYS Gateway Server V2 | High | 7.5 | 2022-06-24 07:46:13 | Deep Dive |
| CVE-2022-31803 | CODESYS Gateway Server V2 prone to Denial of Service Attack | CODESYS | CODESYS Gateway Server V2 | Medium | 5.3 | 2022-06-24 07:46:11 | Deep Dive |
| CVE-2022-31802 | Partial string comparison in CODESYS gateway server | CODESYS | CODESYS Gateway Server V2 | Critical | 9.8 | 2022-06-24 07:46:10 | Deep Dive |
| CVE-2022-1965 | CODESYS runtime system prone to file deletion due to improper error handling | CODESYS | Runtime Toolkit | High | 8.1 | 2022-06-24 07:46:08 | Deep Dive |