Deltaww

Diascreen

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 02:24:40
  • Zuletzt bearbeitet 08.10.2025 16:06:43

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 02:24:30
  • Zuletzt bearbeitet 08.10.2025 16:06:48

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 02:22:49
  • Zuletzt bearbeitet 08.10.2025 16:06:52

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 02:21:47
  • Zuletzt bearbeitet 08.10.2025 16:07:00

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

  • EPSS 0.18%
  • Veröffentlicht 11.11.2024 15:15:06
  • Zuletzt bearbeitet 30.01.2025 14:35:10

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.

  • EPSS 0.24%
  • Veröffentlicht 11.11.2024 15:15:05
  • Zuletzt bearbeitet 30.01.2025 14:35:18

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.

  • EPSS 1.97%
  • Veröffentlicht 11.11.2024 15:15:05
  • Zuletzt bearbeitet 30.01.2025 14:34:40

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code.

  • EPSS 0.18%
  • Veröffentlicht 06.08.2024 17:15:54
  • Zuletzt bearbeitet 12.08.2024 18:50:46

A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.

  • EPSS 0.04%
  • Veröffentlicht 21.09.2023 23:15:13
  • Zuletzt bearbeitet 21.11.2024 08:41:00

Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.

  • EPSS 0.09%
  • Veröffentlicht 08.02.2023 23:15:11
  • Zuletzt bearbeitet 21.11.2024 07:36:49

Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.