Lucene search

K
FatekWinproladder

14 matches found

CVE
CVE
added 2021/12/28 7:15 p.m.54 views

CVE-2021-43554

FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.

7.8CVSS7.9AI score0.00316EPSS
CVE
CVE
added 2021/12/28 7:15 p.m.51 views

CVE-2021-43556

FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code.

7.8CVSS8AI score0.00609EPSS
CVE
CVE
added 2020/09/30 9:15 p.m.50 views

CVE-2020-16234

In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an attacker to remotely execute arbitrary code.

7.8CVSS8AI score0.00553EPSS
CVE
CVE
added 2021/06/29 3:15 p.m.48 views

CVE-2021-32992

FATEK Automation WinProladder Versions 3.30 and prior do not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code.

9.8CVSS9.5AI score0.007EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.45 views

CVE-2021-38430

FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.

7.8CVSS7.9AI score0.00374EPSS
CVE
CVE
added 2021/06/29 3:15 p.m.40 views

CVE-2021-32988

FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.

9.8CVSS9.6AI score0.00748EPSS
CVE
CVE
added 2021/06/29 3:15 p.m.39 views

CVE-2021-32990

FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.

9.8CVSS9.6AI score0.00748EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.38 views

CVE-2021-38434

FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.

7.8CVSS7.8AI score0.00302EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.37 views

CVE-2021-38426

FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.

7.8CVSS7.8AI score0.00302EPSS
CVE
CVE
added 2021/04/12 3:15 p.m.36 views

CVE-2021-27486

FATEK Automation WinProladder Versions 3.30 and prior is vulnerable to an integer underflow, which may cause an out-of-bounds write and allow an attacker to execute arbitrary code.

7.8CVSS7.9AI score0.00263EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.36 views

CVE-2021-38436

FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

7.8CVSS7.8AI score0.00555EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.36 views

CVE-2021-38442

FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.

7.8CVSS7.5AI score0.00555EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.34 views

CVE-2021-38440

FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.

4.3CVSS4AI score0.00147EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.33 views

CVE-2021-38438

A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.

7.8CVSS7.9AI score0.00223EPSS