Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44307 | In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-022/ |
|
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-345 |
Wed, 02 Oct 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-940 |
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-02-27T21:11:34.700Z
Reserved: 2023-07-13T13:04:46.976Z
Link: CVE-2023-3663
Updated: 2024-08-02T07:01:57.323Z
Status : Modified
Published: 2023-08-03T11:15:10.077
Modified: 2024-11-21T08:17:47.187
Link: CVE-2023-3663
No data.
OpenCVE Enrichment
No data.
EUVD