Download
| Alert*
oval:org.secpod.oval:def:3942
3S CoDeSys is installed oval:org.secpod.oval:def:3946 The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long URI. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3945 The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a large size value in the packet header. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3944 The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Content-Length in an HTTP POST or an invalid HTTP request method. Successful exploitation allows remote attac ... oval:org.secpod.oval:def:3943 The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle a specially-crafted HTTP GET request. Successful exploitation allows remote attackers to traverse directories on the ... |