Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Plc_editor
(We\-Con)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-12-01 | CVE-2020-25177 | WECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution. | Plc_editor | 8.8 | ||
2020-12-01 | CVE-2020-25181 | WECON PLC Editor Versions 1.3.8 and prior has a heap-based buffer overflow vulnerabilities have been identified that may allow arbitrary code execution. | Plc_editor | 8.8 | ||
2021-11-22 | CVE-2021-42707 | PLC Editor Versions 1.3.8 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code. | Plc_editor | 7.8 | ||
2021-11-22 | CVE-2021-42705 | PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. | Plc_editor | 7.8 | ||
2019-12-23 | CVE-2019-18236 | Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. | Plc_editor | N/A | ||
2018-09-19 | CVE-2018-14792 | WECON PLC Editor version 1.3.3U may allow an attacker to execute code under the current process when processing project files. | Plc_editor | 6.3 |