Critical
CVSS: 10.0
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.
High
CVSS: 7.3
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.
Medium
CVSS: 5.9
DIAEnergie - Reflected Cross-site Scripting
Medium
CVSS: 5.9
DIAEnergie - Reflected Cross-site Scripting
Medium
CVSS: 5.9
DIAEnergie - Reflected Cross-site Scripting
High
CVSS: 7.0
DIAEnergie - Stored Cross-site Scripting
High
CVSS: 7.3
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
High
CVSS: 7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
High
CVSS: 7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
High
CVSS: 7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
High
CVSS: 7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
High
CVSS: 8.4
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vu…
High
CVSS: 7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vu…