Filtered by vendor We-con Subscriptions
Filtered by product Levistudiou Subscriptions
Total 14 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-43983 1 We-con 1 Levistudiou 2024-11-21 7.8 High
WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsing project files, which may allow an attacker to execute arbitrary code.
CVE-2021-23157 1 We-con 1 Levistudiou 2024-11-21 7.8 High
WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.
CVE-2021-23138 1 We-con 1 Levistudiou 2024-11-21 7.8 High
WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.
CVE-2020-25199 1 We-con 1 Levistudiou 2024-11-21 7.8 High
A heap-based buffer overflow vulnerability exists within the WECON LeviStudioU Release Build 2019-09-21 and prior when processing project files. Opening a specially crafted project file could allow an attacker to exploit and execute code under the privileges of the application.
CVE-2020-25186 1 We-con 1 Levistudiou 2024-11-21 7.5 High
An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure.
CVE-2020-16243 1 We-con 1 Levistudiou 2024-11-21 7.8 High
Multiple buffer overflow vulnerabilities exist when LeviStudioU (Version 2019-09-21 and prior) processes project files. Opening a specially crafted project file could allow an attacker to exploit and execute code under the privileges of the application.
CVE-2019-6541 1 We-con 1 Levistudiou 2024-11-21 7.8 High
A memory corruption vulnerability has been identified in WECON LeviStudioU version 1.8.56 and prior, which may allow arbitrary code execution. Mat Powell, Ziad Badawi, and Natnael Samson working with Trend Micro's Zero Day Initiative, reported these vulnerabilities to NCCIC.
CVE-2019-6539 1 We-con 1 Levistudiou 2024-11-21 7.8 High
Several heap-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior have been identified, which may allow arbitrary code execution. Mat Powell, Ziad Badawi, and Natnael Samson working with Trend Micro's Zero Day Initiative, reported these vulnerabilities to NCCIC.
CVE-2019-6537 1 We-con 1 Levistudiou 2024-11-21 7.8 High
Multiple stack-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior may be exploited when parsing strings within project files. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage these vulnerabilities to execute code under the context of the current process. Mat Powell, Ziad Badawi, and Natnael Samson working with Trend Micro's Zero Day Initiative, reported these vulnerabilities to NCCIC.
CVE-2018-7527 1 We-con 3 Levistudio Hmi Editor, Levistudiou, Pi Studio Hmi Project Programmer 2024-11-21 N/A
A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.
CVE-2018-10614 1 We-con 1 Levistudiou 2024-11-21 N/A
An XXE vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project XML files.
CVE-2018-10610 1 We-con 1 Levistudiou 2024-11-21 N/A
An out-of-bounds vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project files.
CVE-2018-10606 1 We-con 1 Levistudiou 2024-11-21 8.8 High
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple heap-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.
CVE-2018-10602 1 We-con 1 Levistudiou 2024-11-21 8.8 High
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.