Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21 | Third Party Advisory US Government Resource |
Configurations
History
17 Oct 2024, 14:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21 - Third Party Advisory, US Government Resource | |
First Time |
Deltaww cncsoft-g2
Deltaww |
|
CPE | cpe:2.3:a:deltaww:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
15 Oct 2024, 12:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-10 18:15
Updated : 2024-10-17 14:37
NVD link : CVE-2024-47964
Mitre link : CVE-2024-47964
CVE.ORG link : CVE-2024-47964
JSON object : View
Products Affected
deltaww
- cncsoft-g2