cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-1595,https://securityvulnerability.io/vulnerability/CVE-2024-1595,Delta Electronics CNCSoft-B DOPSoft Vulnerability,"A vulnerability in Delta Electronics CNCSoft-B DOPSoft allows for insecure library loading, which can lead to DLL hijacking. This exploitation method enables attackers to compromise the integrity of the system where the software is installed, potentially granting unauthorized control over the device. This threat is particularly concerning for industrial control systems utilizing DOPSoft, as it may allow malicious entities to execute arbitrary code under the context of the application, leading to severe operational impacts.",Delta Electronics,Cncsoft-b V1.0.0.4 Dopsoft,7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-02-29T19:16:08.644Z,0 CVE-2023-43824,https://securityvulnerability.io/vulnerability/CVE-2023-43824,Delta Electronics Delta Industrial Automation DOPSoft DPS File wTitleTextLen Buffer Overflow Remote Code Execution,"A stack-based buffer overflow has been identified in Delta Electronics' Delta Industrial Automation DOPSoft when handling the wTitleTextLen field during DPS file parsing. This vulnerability can be exploited by a remote and unauthenticated attacker who tricks a user into opening a specially crafted DPS file. This exploitation can potentially lead to remote code execution, posing significant risks to affected systems. Users and organizations using the DOPSoft software should be aware of this issue and consider applying appropriate security measures.",Delta Electronics,Dopsoft,8.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:16:48.103Z,0 CVE-2023-43823,https://securityvulnerability.io/vulnerability/CVE-2023-43823,Delta Electronics Delta Industrial Automation DOPSoft DPS File wTTitleLen Buffer Overflow Remote Code Execution,"A stack based buffer overflow vulnerability has been identified in Delta Electronics' Delta Industrial Automation DOPSoft software. The issue arises during the parsing of the wTTitleLen field within specially crafted DPS files. An attacker, without needing any authentication, can exploit this weakness by convincing a user to open a malicious DPS file. This exploitation can lead to remote code execution on the affected systems, potentially compromising the integrity and confidentiality of sensitive data.",Delta Electronics,DOPSoft,7.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:16:36.971Z,0 CVE-2023-43822,https://securityvulnerability.io/vulnerability/CVE-2023-43822,Delta Electronics Delta Industrial Automation DOPSoft DPS File wLogTitlesTimeLen Buffer Overflow Remote Code Execution,"A significant stack-based buffer overflow vulnerability exists in Delta Electronics' DOPSoft automation software, specifically when processing the wLogTitlesTimeLen field in a DPS file. This vulnerability allows an unauthenticated remote attacker to exploit the flaw by tricking a user into opening a maliciously crafted DPS file. Successful exploitation can result in remote code execution, potentially compromising the integrity and security of affected systems.",Delta Electronics,DOPSoft,7.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:16:25.943Z,0 CVE-2023-43821,https://securityvulnerability.io/vulnerability/CVE-2023-43821,Delta Electronics Delta Industrial Automation DOPSoft DPS File wLogTitlesActionLen Buffer Overflow Remote Code Execution,"A stack-based buffer overflow vulnerability has been identified in Delta Electronics Delta Industrial Automation DOPSoft related to the wLogTitlesActionLen field within a DPS file. An unauthenticated attacker can exploit this issue by tricking users into opening a maliciously crafted DPS file, leading to the execution of arbitrary code on the affected system. This vulnerability poses significant risks as successful exploitation may allow an attacker to gain unauthorized access and control over an affected device. Organizations using Delta DOPSoft should ensure their systems are updated and that users are educated on the risks of opening unknown DPS files.",Delta Electronics,Dopsoft,8.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:16:15.341Z,0 CVE-2023-43820,https://securityvulnerability.io/vulnerability/CVE-2023-43820,Delta Electronics Delta Industrial Automation DOPSoft DPS File wLogTitlesPrevValueLen Buffer Overflow Remote Code Execution,"A stack-based buffer overflow vulnerability exists in Delta Electronics' Delta Industrial Automation DOPSoft application when processing the wLogTitlesPrevValueLen field within a DPS file. An unauthenticated attacker could exploit this flaw by tricking a user into opening a specially crafted DPS file. Successful exploitation may lead to the execution of arbitrary code on the affected system, potentially compromising sensitive data and allowing unauthorized control over the system.",Delta Electronics,Dopsoft,8.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:16:04.515Z,0 CVE-2023-43819,https://securityvulnerability.io/vulnerability/CVE-2023-43819,Delta Electronics Delta Industrial Automation DOPSoft DPS File InitialMacroLen Buffer Overflow Remote Code Execution,"A vulnerability exists in Delta Electronics' DOPSoft software that allows a stack-based buffer overflow when parsing the InitialMacroLen field within a specially crafted DPS file. Attackers may exploit this weakness to execute arbitrary code remotely, posing significant risks to the security and integrity of systems utilizing this software. Users are advised to exercise caution when handling DPS files and to implement protective measures to mitigate potential attacks.",Delta Electronics,DOPSoft,7.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2024-01-18T21:15:53.528Z,0 CVE-2023-43818,https://securityvulnerability.io/vulnerability/CVE-2023-43818,Delta Electronics Delta Industrial Automation DOPSoft DPS File wTextLen Buffer Overflow Remote Code Execution,"A buffer overflow vulnerability exists in Delta Electronics' DOPSoft software used for industrial automation. This flaw allows remote, unauthenticated attackers to execute arbitrary code on affected systems. By convincing a user to open a maliciously crafted DPS file, the attacker can exploit this vulnerability to gain control of the system, potentially leading to unauthorized access and manipulation of industrial environments. Organizations utilizing DOPSoft should consider implementing security measures to mitigate the risk associated with this vulnerability.",Delta Electronics,DOPSoft,7.8,HIGH,0.0008999999845400453,false,,false,false,false,,,false,false,,2024-01-18T21:15:44.367Z,0 CVE-2023-43817,https://securityvulnerability.io/vulnerability/CVE-2023-43817,Delta Electronics Delta Industrial Automation DOPSoft DPS File wMailContentLen Buffer Overflow Remote Code Execution,"A vulnerability exists in Delta Electronics' DOPSoft software version 2 that permits a buffer overflow when processing the wMailContentLen field of a specially crafted DPS file. This flaw can be exploited by an unauthorized user to lure victims into opening malformed DPS files, resulting in arbitrary code execution on the affected system. Organizations utilizing this software should evaluate their exposure and implement appropriate security measures to mitigate potential risks associated with this vulnerability.",Delta Electronics,DOPSoft,7.8,HIGH,0.0026400000788271427,false,,false,false,false,,,false,false,,2024-01-18T21:15:32.931Z,0 CVE-2023-43816,https://securityvulnerability.io/vulnerability/CVE-2023-43816,Delta Electronics Delta Industrial Automation DOPSoft DPS File wKPFStringLen Buffer Overflow Remote Code Execution,"A critical buffer overflow vulnerability exists in Delta Electronics’ DOPSoft version 2 when processing the wKPFStringLen field in DPS files. This flaw can be exploited by an anonymous attacker who tempts a user into opening a specially devised DPS file. Such exploitation could lead to unauthorized code execution, potentially allowing the attacker to manipulate or gain control over the affected system.",Delta Electronics,Dopsoft,6.3,MEDIUM,0.0026400000788271427,false,,false,false,false,,,false,false,,2024-01-18T21:15:21.742Z,0 CVE-2023-43815,https://securityvulnerability.io/vulnerability/CVE-2023-43815,Delta Electronics Delta Industrial Automation DOPSoft DPS File wScreenDESCTextLen Buffer Overflow Remote Code Execution,"A vulnerability exists in Delta Electronics' DOPSoft software, specifically in version 2, related to how the application handles the wScreenDESCTextLen field in DPS files. An attacker can exploit this flaw by crafting a malicious DPS file. If a user opens this file, the exploitation could lead to the execution of arbitrary code, putting the system and its data at risk. This highlights the importance of validating and securing the input files within the software.",Delta Electronics,DOPSoft,7.8,HIGH,0.0026400000788271427,false,,false,false,false,,,false,false,,2024-01-18T21:15:04.830Z,0 CVE-2023-5944,https://securityvulnerability.io/vulnerability/CVE-2023-5944,Delta Electronics DOPSoft Stack-based Buffer Overflow,"Delta Electronics DOPSoft contains a stack-based buffer overflow vulnerability that could potentially enable attackers to execute arbitrary code. This security flaw occurs when an attacker convinces a legitimate user to open a specially crafted file, leading to unauthorized actions within the system. Users should urgently apply the latest updates and implement security best practices to mitigate against this threat.",Delta Electronics,DOPSoft,7.8,HIGH,0.0010600000387057662,false,,false,false,false,,,false,false,,2023-12-04T23:15:00.000Z,0 CVE-2023-24014,https://securityvulnerability.io/vulnerability/CVE-2023-24014,Delta Electronics CNCSoft-B DOPSoft Heap-based buffer overflow,"Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and earlier are susceptible to a heap-based buffer overflow. This vulnerability enables attackers to exploit the software to potentially execute arbitrary code, posing significant risks to system integrity and security.",Delta Electronics,CNCSoft-B DOPSoft,7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2023-06-07T21:15:00.000Z,0 CVE-2023-25177,https://securityvulnerability.io/vulnerability/CVE-2023-25177,Delta Electronics CNCSoft-B DOPSoft Stack-based buffer overflow,"Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and earlier are susceptible to a stack-based buffer overflow vulnerability. This issue could allow a malicious actor to inject and execute arbitrary code on the affected system, potentially compromising its integrity and confidentiality.",Delta Electronics,CNCSoft-B DOPSoft,7.8,HIGH,0.0008500000112690032,false,,false,false,false,,,false,false,,2023-06-07T21:15:00.000Z,0 CVE-2022-2966,https://securityvulnerability.io/vulnerability/CVE-2022-2966,"Delta Electronics DOPSoft Out-of-bounds Read ","Out-of-bounds Read vulnerability in Delta Electronics DOPSoft.This issue affects DOPSoft: All Versions. ",Delta Electronics,Dopsoft,3.3,LOW,0.0010999999940395355,false,,false,false,false,,,false,false,,2022-12-16T19:51:06.584Z,0 CVE-2021-38402,https://securityvulnerability.io/vulnerability/CVE-2021-38402,Delta Electronics DOPSoft 2 Stack-Based Buffer Overflow,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.,Delta Electronics,Dopsoft 2,7.8,HIGH,0.025989999994635582,false,,false,false,false,,,false,false,,2021-09-17T19:15:00.000Z,0 CVE-2021-38406,https://securityvulnerability.io/vulnerability/CVE-2021-38406,Delta Electronics DOPSoft 2 Out-of-Bounds Write,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.,Delta Electronics,Dopsoft 2,7.8,HIGH,0.7675399780273438,true,2022-08-25T00:00:00.000Z,false,false,true,2022-08-25T00:00:00.000Z,,false,false,,2021-09-17T19:15:00.000Z,0 CVE-2021-38404,https://securityvulnerability.io/vulnerability/CVE-2021-38404,Delta Electronics DOPSoft 2 Heap-based Buffer Overflow,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.,Delta Electronics,Dopsoft 2,7.8,HIGH,0.01817999966442585,false,,false,false,false,,,false,false,,2021-09-17T19:15:00.000Z,0 CVE-2018-10617,https://securityvulnerability.io/vulnerability/CVE-2018-10617,,"Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.",Delta Electronics,Delta Industrial Automation Dopsoft,9.8,CRITICAL,0.01939000003039837,false,,false,false,false,,,false,false,,2018-06-18T19:29:00.000Z,0 CVE-2018-10621,https://securityvulnerability.io/vulnerability/CVE-2018-10621,,"Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.",Delta Electronics,Delta Industrial Automation Dopsoft,9.8,CRITICAL,0.01939000003039837,false,,false,false,false,,,false,false,,2018-06-18T19:29:00.000Z,0 CVE-2018-10623,https://securityvulnerability.io/vulnerability/CVE-2018-10623,,"Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote code execution, alter the intended control flow, allow reading of sensitive information, or cause the application to crash.",Delta Electronics,Delta Industrial Automation Dopsoft,9.8,CRITICAL,0.03551999852061272,false,,false,false,false,,,false,false,,2018-06-18T19:29:00.000Z,0