Product:

Codemeter_runtime

(Wibu)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 4
Date Id Summary Products Score Patch Annotated
2023-09-13 CVE-2023-3935 A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system. Activation_wizard, E\-Mobility_charging_suite, Fl_network_manager, Iol\-Conf, Module_type_package_designer, Plcnext_engineer, Oseon, Programmingtube, Teczonebend, Tops_unfold, Topscalculation, Trumpflicenseexpert, Trutops, Trutops_cell_classic, Trutops_cell_sw48, Trutops_mark_3d, Trutopsboost, Trutopsfab, Trutopsfab_storage_smallstore, Trutopsprint, Trutopsprintmultilaserassistant, Trutopsweld, Tubedesign, Codemeter_runtime 9.8
2021-11-14 CVE-2021-41057 In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions. Pss_cape, Pss_e, Pss_odms, Sicam_230, Simatic_information_server, Simatic_pcs_neo, Simatic_process_historian, Simatic_wincc_oa, Simit, Codemeter_runtime 7.1
2014-11-26 CVE-2014-8419 Wibu-Systems CodeMeter Runtime before 5.20 uses weak permissions (read and write access for all users) for codemeter.exe, which allows local users to gain privileges via a Trojan horse file. Codemeter_runtime N/A
2012-01-13 CVE-2011-4057 Wibu-Systems AG CodeMeter Runtime 4.30c, 4.10b, and possibly other versions before 4.40 allows remote attackers to cause a denial of service (CodeMeter.exe crash) via certain crafted packets to TCP port 22350. Codemeter_runtime N/A