Filtered by vendor Deltaww
Subscriptions
Total
234 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-1404 | 1 Deltaww | 1 Cncsoft | 2025-04-16 | 3.3 Low |
Delta Electronics CNCSoft (All versions prior to 1.01.32) does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. | ||||
CVE-2022-2759 | 1 Deltaww | 1 Delta Robot Automation Studio | 2025-04-16 | 5.5 Medium |
Delta Electronics Delta Robot Automation Studio (DRAS) versions prior to 1.13.20 are affected by improper restrictions where the software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. This may allow an attacker to view sensitive documents and information on the affected host. | ||||
CVE-2022-38142 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 9.8 Critical |
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-Gateway service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization. | ||||
CVE-2022-41657 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 9.8 Critical |
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution. | ||||
CVE-2022-41772 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 9.8 Critical |
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution. | ||||
CVE-2022-40202 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 9.8 Critical |
The database backup function in Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior lacks proper authentication. An attacker could provide malicious serialized objects which, when deserialized, could activate an opcode for a backup scheduling function without authentication. This function allows the user to designate all function arguments and the file to be executed. This could allow the attacker to start any new process and achieve remote code execution. | ||||
CVE-2022-41688 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 9.8 Critical |
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lack proper authentication for functions that create and modify user groups. An attacker could provide malicious serialized objects that could run these functions without authentication to create a new user and add them to the administrator group. | ||||
CVE-2022-41776 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 7.5 High |
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to trigger the WriteConfiguration method, which could allow an attacker to provide new values for user configuration files such as UserListInfo.xml. This could lead to the changing of administrative passwords. | ||||
CVE-2022-41629 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-16 | 7.5 High |
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to access the aprunning endpoint, which could allow an attacker to retrieve any file from the “RunningConfigs” directory. The attacker could then view and modify configuration files such as UserListInfo.xml, which would allow them to see existing administrative passwords. | ||||
CVE-2022-2969 | 1 Deltaww | 1 Dialink | 2025-04-16 | 8.1 High |
Delta Industrial Automation DIALink versions prior to v1.5.0.0 Beta 4 uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within the pathname, which can cause the pathname to resolve to a location outside of the restricted directory. | ||||
CVE-2022-2660 | 1 Deltaww | 1 Dialink | 2025-04-16 | 9.8 Critical |
Delta Industrial Automation DIALink versions 1.4.0.0 and prior are vulnerable to the use of a hard-coded cryptographic key which could allow an attacker to decrypt sensitive data and compromise the machine. | ||||
CVE-2022-2966 | 1 Deltaww | 1 Dopsoft | 2025-04-16 | 3.3 Low |
Out-of-bounds Read vulnerability in Delta Electronics DOPSoft.This issue affects DOPSoft: All Versions. | ||||
CVE-2023-47279 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-15 | 7.5 High |
In Delta Electronics InfraSuite Device Master v.1.0.7, A vulnerability exists that allows an unauthenticated attacker to disclose user information through a single UDP packet, obtain plaintext credentials, or perform NTLM relaying. | ||||
CVE-2023-0444 | 1 Deltaww | 1 Infrasuite Device Master | 2025-04-03 | 8.8 High |
A privilege escalation vulnerability exists in Delta Electronics InfraSuite Device Master 00.00.02a. A default user 'User', which is in the 'Read Only User' group, can view the password of another default user 'Administrator', which is in the 'Administrator' group. This allows any lower privileged user to log in as an administrator. | ||||
CVE-2024-25574 | 1 Deltaww | 1 Diaenergie | 2025-02-27 | 8.8 High |
SQL injection vulnerability exists in GetDIAE_usListParameters. | ||||
CVE-2023-1133 | 1 Deltaww | 1 Infrasuite Device Master | 2025-02-13 | 9.8 Critical |
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which the Device-status service listens on port 10100/ UDP by default. The service accepts the unverified UDP packets and deserializes the content, which could allow an unauthenticated attacker to remotely execute arbitrary code. | ||||
CVE-2021-38406 | 1 Deltaww | 1 Dopsoft | 2025-02-12 | 7.8 High |
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process. | ||||
CVE-2024-39354 | 1 Deltaww | 1 Diascreen | 2025-01-30 | 7.8 High |
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code. | ||||
CVE-2024-47131 | 1 Deltaww | 1 Diascreen | 2025-01-30 | 7.8 High |
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code. | ||||
CVE-2024-39605 | 1 Deltaww | 1 Diascreen | 2025-01-30 | 7.8 High |
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code. |