Summary
Detail | |||
---|---|---|---|
Vendor | Codesys | First view | 2019-02-19 |
Product | Plchandler | Last view | 2022-06-24 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:codesys:plchandler:*:*:*:*:*:*:*:* | 3 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.3 | 2022-06-24 | CVE-2022-31805 | In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. |
7.3 | 2021-05-03 | CVE-2021-29242 | CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. |
7.5 | 2019-02-19 | CVE-2018-20026 | Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-20 | Improper Input Validation |