Filtered by vendor Fatek
Subscriptions
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-38440 | 1 Fatek | 1 Winproladder | 2024-09-17 | 3.3 Low |
FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information. | ||||
CVE-2021-38436 | 1 Fatek | 1 Winproladder | 2024-09-17 | 7.8 High |
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | ||||
CVE-2022-21209 | 1 Fatek | 1 Fvdesigner | 2024-09-17 | 7.8 High |
The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution. | ||||
CVE-2021-38442 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. | ||||
CVE-2021-38434 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code. | ||||
CVE-2022-25170 | 1 Fatek | 1 Fvdesigner | 2024-09-16 | 7.8 High |
The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code | ||||
CVE-2021-38438 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution. | ||||
CVE-2021-38426 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code. | ||||
CVE-2021-43556 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. | ||||
CVE-2022-23985 | 1 Fatek | 1 Fvdesigner | 2024-09-16 | 7.8 High |
The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution. | ||||
CVE-2021-38432 | 1 Fatek | 2 Communication Server, Communication Server Firmware | 2024-09-16 | 9.8 Critical |
FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code. | ||||
CVE-2021-43554 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code. | ||||
CVE-2021-38430 | 1 Fatek | 1 Winproladder | 2024-09-16 | 7.8 High |
FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code. | ||||
CVE-2016-8377 | 1 Fatek | 2 Plc Winproladder, Plc Winproladder Firmware | 2024-08-06 | 8.0 High |
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution. | ||||
CVE-2016-5800 | 1 Fatek | 2 Automation Fv Designer, Automation Pm Designer V3 | 2024-08-06 | N/A |
A malicious attacker can trigger a remote buffer overflow in the Communication Server in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. | ||||
CVE-2016-5798 | 1 Fatek | 2 Automation Fv Designer, Automation Pm Designer | 2024-08-06 | N/A |
An issue was discovered in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. By sending additional valid packets, an attacker could trigger a stack-based buffer overflow and cause a crash. Also, a malicious attacker can trigger a remote buffer overflow on the Fatek Communication Server. | ||||
CVE-2016-5796 | 1 Fatek | 2 Automation Fv Designer, Automation Pm Designer | 2024-08-06 | N/A |
An issue was discovered in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. Sending additional valid packets could allow the attacker to cause a crash or to execute arbitrary code, because of Improper Restriction of Operations within the Bounds of a Memory Buffer. | ||||
CVE-2017-6023 | 1 Fatek | 5 Ethernet Module Configuration Tool Cbe Firmware, Ethernet Module Configuration Tool Cbeh Firmware, Ethernet Module Configuration Tool Cm25e Firmware and 2 more | 2024-08-05 | 9.8 Critical |
An issue was discovered in Fatek Automation PLC Ethernet Module. The affected Ether_cfg software configuration tool runs on the following Fatek PLCs: CBEH versions prior to V3.6 Build 170215, CBE versions prior to V3.6 Build 170215, CM55E versions prior to V3.6 Build 170215, and CM25E versions prior to V3.6 Build 170215. A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution or crash the affected device. | ||||
CVE-2020-16234 | 1 Fatek | 1 Winproladder | 2024-08-04 | 7.8 High |
In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an attacker to remotely execute arbitrary code. | ||||
CVE-2021-32990 | 1 Fatek | 1 Winproladder | 2024-08-03 | 9.8 Critical |
FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code. |