Vulnerabilities (CVE)

Filtered by vendor We-con Subscribe
Total 30 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-14818 1 We-con 2 Pi Studio, Pi Studio Hmi 2024-11-21 7.5 HIGH 9.8 CRITICAL
WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior have a stack-based buffer overflow vulnerability which may allow remote code execution.
CVE-2018-14814 1 We-con 2 Pi Studio, Pi Studio Hmi 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
WECON Technology PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior lacks proper validation of user-supplied data, which may result in a read past the end of an allocated object.
CVE-2018-14810 1 We-con 2 Pi Studio, Pi Studio Hmi 2024-11-21 9.3 HIGH 8.8 HIGH
WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior parse files and pass invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator.
CVE-2018-14792 1 We-con 1 Plc Editor 2024-11-21 6.8 MEDIUM 6.3 MEDIUM
WECON PLC Editor version 1.3.3U may allow an attacker to execute code under the current process when processing project files.
CVE-2018-10614 1 We-con 1 Levistudiou 2024-11-21 6.8 MEDIUM 8.8 HIGH
An XXE vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project XML files.
CVE-2018-10610 1 We-con 1 Levistudiou 2024-11-21 6.8 MEDIUM 8.8 HIGH
An out-of-bounds vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project files.
CVE-2018-10606 1 We-con 1 Levistudiou 2024-11-21 9.3 HIGH 8.8 HIGH
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple heap-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.
CVE-2018-10602 1 We-con 1 Levistudiou 2024-11-21 9.3 HIGH 8.8 HIGH
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.
CVE-2017-16739 1 We-con 2 Levistudio Hmi Editor, Levistudio Hmi Editor Firmware 2024-11-21 6.8 MEDIUM 7.8 HIGH
An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. Specially-crafted malicious files may be able to cause stack-based buffer overflow vulnerabilities, which may allow remote code execution.
CVE-2017-16737 1 We-con 2 Levistudio Hmi Editor, Levistudio Hmi Editor Firmware 2024-11-21 6.8 MEDIUM 7.8 HIGH
An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. A specially-crafted malicious file may be able to cause a heap-based buffer overflow vulnerability when opened by a user.