Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    17 Oct 2024, 14:37
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21 - Third Party Advisory, US Government Resource | |
| First Time | 
        
        Deltaww
         Deltaww cncsoft-g2  | 
|
| CPE | cpe:2.3:a:deltaww:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:* | |
| CWE | CWE-787 | 
15 Oct 2024, 12:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
10 Oct 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-10 18:15
Updated : 2024-10-17 14:37
NVD link : CVE-2024-47964
Mitre link : CVE-2024-47964
CVE.ORG link : CVE-2024-47964
JSON object : View
Products Affected
                deltaww
- cncsoft-g2
 
