Deltaww

Cncsoft-g2

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 10.10.2024 18:15:08
  • Zuletzt bearbeitet 17.10.2024 14:36:15

Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

  • EPSS 0.56%
  • Veröffentlicht 09.07.2024 22:15:03
  • Zuletzt bearbeitet 21.11.2024 09:28:29

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to e...

  • EPSS 0.56%
  • Veröffentlicht 09.07.2024 22:15:03
  • Zuletzt bearbeitet 21.11.2024 09:28:29

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerabilit...

  • EPSS 0.57%
  • Veröffentlicht 09.07.2024 22:15:02
  • Zuletzt bearbeitet 21.11.2024 09:28:29

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerabili...

  • EPSS 0.53%
  • Veröffentlicht 09.07.2024 22:15:02
  • Zuletzt bearbeitet 21.11.2024 09:28:29

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a memory corruption condition. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code i...

  • EPSS 0.1%
  • Veröffentlicht 30.04.2024 23:15:06
  • Zuletzt bearbeitet 10.07.2025 15:54:18

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.