Vulnerabilities (CVE)

Filtered by vendor Fatek Subscribe
Total 32 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-32988 1 Fatek 1 Winproladder 2024-02-28 7.5 HIGH 9.8 CRITICAL
FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.
CVE-2021-22670 1 Fatek 1 Fvdesigner 2024-02-28 6.8 MEDIUM 7.8 HIGH
An uninitialized pointer may be exploited in Fatek FvDesigner Version 1.5.76 and prior while the application is processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
CVE-2020-16234 1 Fatek 1 Winproladder 2024-02-28 6.8 MEDIUM 7.8 HIGH
In PLC WinProladder Version 3.28 and prior, a stack-based buffer overflow vulnerability can be exploited when a valid user opens a specially crafted file, which may allow an attacker to remotely execute arbitrary code.
CVE-2021-22683 1 Fatek 1 Fvdesigner 2024-02-28 6.8 MEDIUM 7.8 HIGH
Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds write while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
CVE-2021-22638 1 Fatek 1 Fvdesigner 2024-02-28 6.8 MEDIUM 7.8 HIGH
Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds read while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
CVE-2021-22666 1 Fatek 1 Fvdesigner 2024-02-28 6.8 MEDIUM 7.8 HIGH
Fatek FvDesigner Version 1.5.76 and prior is vulnerable to a stack-based buffer overflow while project files are being processed, allowing an attacker to craft a special project file that may permit arbitrary code execution.
CVE-2021-22662 1 Fatek 1 Fvdesigner 2024-02-28 6.8 MEDIUM 7.8 HIGH
A use after free issue has been identified in Fatek FvDesigner Version 1.5.76 and prior in the way the application processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
CVE-2016-5800 1 Fatek 2 Automation Fv Designer, Automation Pm Designer V3 2024-02-28 5.0 MEDIUM 7.5 HIGH
A malicious attacker can trigger a remote buffer overflow in the Communication Server in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0.
CVE-2017-6023 1 Fatek 5 Ethernet Module Configuration Tool Cbe Firmware, Ethernet Module Configuration Tool Cbeh Firmware, Ethernet Module Configuration Tool Cm25e Firmware and 2 more 2024-02-28 9.0 HIGH 9.8 CRITICAL
An issue was discovered in Fatek Automation PLC Ethernet Module. The affected Ether_cfg software configuration tool runs on the following Fatek PLCs: CBEH versions prior to V3.6 Build 170215, CBE versions prior to V3.6 Build 170215, CM55E versions prior to V3.6 Build 170215, and CM25E versions prior to V3.6 Build 170215. A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution or crash the affected device.
CVE-2016-5798 1 Fatek 2 Automation Fv Designer, Automation Pm Designer 2024-02-28 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. By sending additional valid packets, an attacker could trigger a stack-based buffer overflow and cause a crash. Also, a malicious attacker can trigger a remote buffer overflow on the Fatek Communication Server.
CVE-2016-5796 1 Fatek 2 Automation Fv Designer, Automation Pm Designer 2024-02-28 6.8 MEDIUM 8.8 HIGH
An issue was discovered in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0. Sending additional valid packets could allow the attacker to cause a crash or to execute arbitrary code, because of Improper Restriction of Operations within the Bounds of a Memory Buffer.
CVE-2016-8377 1 Fatek 2 Plc Winproladder, Plc Winproladder Firmware 2024-02-28 6.0 MEDIUM 8.0 HIGH
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.