Known Vulnerabilities for LeviStudioU by WECON

Listed below are 1 of the newest known vulnerabilities associated with the software "LeviStudioU" by "WECON".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-43983 WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to multiple stack-based buffer overflow instances while parsin... 7.8 - HIGH 2021-12-13 2022-01-13
CVE-2021-23157 WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker t... 7.8 - HIGH 2022-01-14 2022-01-14
CVE-2021-23138 WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker ... 7.8 - HIGH 2022-01-14 2022-01-14
CVE-2016-4533 Heap-based buffer overflow in WECON LeviStudio allows remote attackers to execute arbitrary code via a crafted file. 7.8 - HIGH 2016-07-12 2020-08-25

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationWeconLevistudiou-AllAllAll

Popular searches for LeviStudioU

WECON LeviStudioU (Update A) | CISA

us-cert.cisa.gov/ics/advisories/ICSA-19-036-03

#WECON LeviStudioU Update A | CISA ECON LeviStudioU Update A Original release date: February 05, 2019 | Last revised: September 20, 2019 Legal Notice. This updated advisory is a follow-up to the original advisory titled ICSA-19-036-03 ECON LeviStudioU M K I that was published February 5, 2019, on the ICS webpage on us-cert.gov. ECON Version 1.8.69 to fix the reported vulnerabilities in Version 1.8.56; however, exploits are still successful against this updated version. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

ics-cert.us-cert.gov/advisories/ICSA-19-036-03 www.us-cert.gov/ics/advisories/ICSA-19-036-03 ISACA Vulnerability (computing) Website Exploit (computer security) Certiorari Web page Common Vulnerability Scoring System International Computer Security Association Patch (computing) Risk assessment Industrial control system Change impact analysis Computer security Common Vulnerabilities and Exposures Notice User interface Information Virtual private network Research Unix User (computing)

WECON LeviStudioU (Update C) | CISA

us-cert.cisa.gov/ics/advisories/icsa-20-238-03

#WECON LeviStudioU Update C | CISA S Q O1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low skill level to exploit Vendor: ECON Technology Co., Ltd ECON Equipment: LeviStudioU 3 1 / --------- Begin Update C Part 1 of 3 ---------

ISACA C (programming language) Website Vulnerability (computing) C Common Vulnerability Scoring System Exploit (computer security) Patch (computing) Buffer overflow Computer security Certiorari Industrial control system Information sensitivity Web page Social engineering (security) Information Email Technology XML HTTPS

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report