Vulnerabilities > WE CON
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-12-23 | CVE-2019-18236 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in We-Con PLC Editor 1.3.5 Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. | 6.8 |
2019-03-27 | CVE-2018-14814 | Out-of-bounds Read vulnerability in We-Con PI Studio and PI Studio HMI WECON Technology PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior lacks proper validation of user-supplied data, which may result in a read past the end of an allocated object. | 4.3 |
2019-02-13 | CVE-2019-6541 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in We-Con Levistudiou 1.8.29/1.8.44 A memory corruption vulnerability has been identified in WECON LeviStudioU version 1.8.56 and prior, which may allow arbitrary code execution. | 6.8 |
2019-02-13 | CVE-2019-6539 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in We-Con Levistudiou 1.8.29/1.8.44 Several heap-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior have been identified, which may allow arbitrary code execution. | 9.3 |
2019-02-13 | CVE-2019-6537 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in We-Con Levistudiou 1.8.29/1.8.44 Multiple stack-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior may be exploited when parsing strings within project files. | 6.8 |
2018-10-09 | CVE-2018-10614 | XXE vulnerability in We-Con Levistudiou 1.8.29/1.8.44 An XXE vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project XML files. | 6.8 |
2018-10-09 | CVE-2018-10610 | Out-of-bounds Write vulnerability in We-Con Levistudiou 1.8.29/1.8.44 An out-of-bounds vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project files. | 6.8 |
2018-10-08 | CVE-2018-17889 | XXE vulnerability in We-Con PI Studio and PI Studio HMI In WECON Technology Co., Ltd. | 4.3 |
2018-10-08 | CVE-2018-14818 | Out-of-bounds Write vulnerability in We-Con PI Studio and PI Studio HMI WECON Technology Co., Ltd. | 7.5 |
2018-10-08 | CVE-2018-14810 | Out-of-bounds Write vulnerability in We-Con PI Studio and PI Studio HMI WECON Technology Co., Ltd. | 9.3 |