Out-of-bounds write vulnerability exists in V-Server V4.0.18.0 and earlier and V-Server Lite V4.0.18.0 and earlier. If a user opens a specially crafted VPR file, information may be disclosed and/or arbitrary code may be executed.
References
Link | Resource |
---|---|
https://hakko-elec.co.jp/site/download/03tellus_inf/index.php | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU93840158/ | Third Party Advisory |
https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php | Vendor Advisory |
https://hakko-elec.co.jp/site/download/03tellus_inf/index.php | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU93840158/ | Third Party Advisory |
https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://hakko-elec.co.jp/site/download/03tellus_inf/index.php - Vendor Advisory | |
References | () https://jvn.jp/en/vu/JVNVU93840158/ - Third Party Advisory | |
References | () https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php - Vendor Advisory |
21 Nov 2023, 21:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://hakko-elec.co.jp/site/download/03tellus_inf/index.php - Vendor Advisory | |
References | () https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php - Vendor Advisory | |
References | () https://jvn.jp/en/vu/JVNVU93840158/ - Third Party Advisory | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Fujielectric v-server
Fujielectric |
|
CPE | cpe:2.3:a:fujielectric:v-server:*:*:*:*:-:*:*:* cpe:2.3:a:fujielectric:v-server:*:*:*:*:lite:*:*:* |
15 Nov 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-15 06:15
Updated : 2024-11-21 08:30
NVD link : CVE-2023-47584
Mitre link : CVE-2023-47584
CVE.ORG link : CVE-2023-47584
JSON object : View
Products Affected
fujielectric
- v-server
CWE
CWE-787
Out-of-bounds Write