CVE-2025-59300
- EPSS 0.01%
- Veröffentlicht 03.10.2025 02:24:40
- Zuletzt bearbeitet 08.10.2025 16:06:43
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2025-59299
- EPSS 0.01%
- Veröffentlicht 03.10.2025 02:24:30
- Zuletzt bearbeitet 08.10.2025 16:06:48
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2025-59298
- EPSS 0.01%
- Veröffentlicht 03.10.2025 02:22:49
- Zuletzt bearbeitet 08.10.2025 16:06:52
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2025-59297
- EPSS 0.01%
- Veröffentlicht 03.10.2025 02:21:47
- Zuletzt bearbeitet 08.10.2025 16:07:00
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2024-47131
- EPSS 0.18%
- Veröffentlicht 11.11.2024 15:15:06
- Zuletzt bearbeitet 30.01.2025 14:35:10
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
CVE-2024-39354
- EPSS 0.24%
- Veröffentlicht 11.11.2024 15:15:05
- Zuletzt bearbeitet 30.01.2025 14:35:18
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
CVE-2024-39605
- EPSS 1.97%
- Veröffentlicht 11.11.2024 15:15:05
- Zuletzt bearbeitet 30.01.2025 14:34:40
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code.
CVE-2024-7502
- EPSS 0.18%
- Veröffentlicht 06.08.2024 17:15:54
- Zuletzt bearbeitet 12.08.2024 18:50:46
A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.
CVE-2023-5068
- EPSS 0.04%
- Veröffentlicht 21.09.2023 23:15:13
- Zuletzt bearbeitet 21.11.2024 08:41:00
Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.
CVE-2023-0249
- EPSS 0.09%
- Veröffentlicht 08.02.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 07:36:49
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.