{ "schema_version": "1.4.0", "id": "GHSA-rvhx-r576-jx25", "modified": "2022-01-22T00:02:08Z", "published": "2022-01-15T00:01:33Z", "aliases": [ "CVE-2021-23138" ], "details": "WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23138" }, { "type": "WEB", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-03" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-129" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-131" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-133" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-134" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-135" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-136" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-137" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-138" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-139" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-140" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-141" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-142" } ], "database_specific": { "cwe_ids": [ "CWE-787" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-14T20:15:00Z" } }