| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2022-47389 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:57:37 | Deep Dive |
| CVE-2022-47388 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:56:44 | Deep Dive |
| CVE-2022-47387 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:54:42 | Deep Dive |
| CVE-2022-47386 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:49:05 | Deep Dive |
| CVE-2022-47385 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:47:18 | Deep Dive |
| CVE-2022-47384 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:46:29 | Deep Dive |
| CVE-2022-47383 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:44:53 | Deep Dive |
| CVE-2022-47382 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:42:48 | Deep Dive |
| CVE-2022-47381 | CODESYS: Multiple products prone to stack based out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:41:52 | Deep Dive |
| CVE-2022-47380 | CODESYS: Multiple products prone to out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:40:45 | Deep Dive |
| CVE-2022-47379 | CODESYS: Multiple products prone to out-of-bounds write | CODESYS | CODESYS Control RTE (SL) | High | 8.8 | 2023-05-15 09:33:42 | Deep Dive |
| CVE-2022-47378 | CODESYS: Multiple products prone to Improper Input Validation | CODESYS | CODESYS Control RTE (SL) | Medium | 6.5 | 2023-05-15 09:30:22 | Deep Dive |
| CVE-2022-22508 | CODESYS V3: Improper Input Validation | CODESYS V3 | CODESYS Control RTE (SL) | Medium | 4.3 | 2023-05-15 09:27:39 | Deep Dive |
| CVE-2022-4224 | CODESYS: Exposure of Resource to Wrong Sphere in CODESYS V3 | CODESYS | Control RTE (SL) | High | 8.8 | 2023-03-23 11:15:37 | Deep Dive |
| CVE-2018-25048 | Codesys Runtime Improper Limitation of a Pathname | CODESYS | Control for BeagleBone | High | 8.8 | 2023-03-23 10:45:37 | Deep Dive |
| CVE-2023-27483 | fieldpath's Paved.SetValue allows growing arrays up to arbitrary sizes in crossplane-runtime | crossplane | crossplane-runtime | Medium | 5.9 | 2023-03-09 20:18:32 | Deep Dive |
| CVE-2022-26421 | Intel(R) oneAPI DPC++/C++ Compiler 代码问题漏洞 | - | Intel(R) oneAPI DPC++/C++ Compiler Runtime | Medium | 6.7 | 2023-02-16 19:59:50 | Deep Dive |
| CVE-2022-4286 | Reflected Cross-Site Scripting Vulnerabilities in Automation Runtime | B&R Industrial Automation | B&R Automation Runtime | Medium | 6.1 | 2023-02-14 14:25:38 | Deep Dive |
| CVE-2022-28331 | Apache Portable Runtime (APR): Windows out-of-bounds write in apr_socket_sendv function | Apache Software Foundation | Apache Portable Runtime (APR) | 超危 | - | 2023-01-31 15:55:21 | Deep Dive |
| CVE-2022-25147 | Apache Portable Runtime Utility (APR-util): out-of-bounds writes in the apr_base64 family of functions | Apache Software Foundation | Apache Portable Runtime Utility (APR-util) | 中危 | - | 2023-01-31 15:54:51 | Deep Dive |