📦 Cncsoft G2
by Deltaww
🔍 What is Cncsoft G2?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Delta Electronics CNCSoft-G2 has a file parsing vulnerability that allows out-of-bounds write when processing malicious files. This enables remote code execution in the context of the current process....
Delta Electronics CNCSoft-G2 has a stack-based buffer overflow vulnerability due to improper file validation. Attackers can execute arbitrary code by tricking users into opening malicious files. This ...
Delta Electronics CNCSoft-G2 has a memory corruption vulnerability due to improper file validation. Attackers can execute arbitrary code by tricking users into opening malicious files. This affects al...
Delta Electronics CNCSoft-G2 has a heap-based buffer overflow vulnerability (CWE-122) that allows remote code execution when users visit malicious pages or open malicious files. Attackers can exploit ...
Delta Electronics CNCSoft-G2 has a heap-based buffer overflow vulnerability (CWE-122) that allows remote code execution when users visit malicious pages or open malicious files. Attackers can exploit ...
Delta Electronics CNCSoft-G2 has a memory corruption vulnerability where improper validation of user-supplied data allows writing past allocated object boundaries. Attackers can exploit this by tricki...
Delta Electronics CNCSoft-G2 has a buffer over-read vulnerability (CWE-125) that allows attackers to read memory beyond allocated buffers. This can lead to information disclosure or be combined with o...
Delta Electronics CNCSoft-G2 has a heap-based buffer overflow vulnerability due to improper length validation of user-supplied data. Attackers can exploit this by tricking users into visiting maliciou...
Delta Electronics CNCSoft-G2 software has a memory corruption vulnerability due to improper input validation. Attackers can exploit this by tricking users into opening malicious files or visiting mali...
Delta Electronics CNCSoft-G2 has a stack-based buffer overflow vulnerability due to improper length validation of user-supplied data. This allows attackers to execute arbitrary code within the current...