Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cncsoft\-G2
(Deltaww)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 9 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-07-09 | CVE-2024-39880 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 8.8 | ||
2024-07-09 | CVE-2024-39881 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a memory corruption condition. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 8.8 | ||
2024-07-09 | CVE-2024-39883 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 8.8 | ||
2024-07-09 | CVE-2024-39882 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 8.8 | ||
2024-10-10 | CVE-2024-47964 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 7.8 | ||
2024-10-10 | CVE-2024-47966 | Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 7.8 | ||
2024-10-10 | CVE-2024-47962 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 7.8 | ||
2024-10-10 | CVE-2024-47963 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 7.8 | ||
2024-10-10 | CVE-2024-47965 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process. | Cncsoft\-G2 | 7.8 |