Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ispsoft
(Deltaww)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-04-30 | CVE-2025-22882 | Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing CBDGL file. | Ispsoft | 9.8 | ||
2025-04-30 | CVE-2025-22883 | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. | Ispsoft | 9.8 | ||
2025-04-30 | CVE-2025-22884 | Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. | Ispsoft | 9.8 | ||
2025-04-30 | CVE-2025-4124 | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file. | Ispsoft | 9.8 | ||
2025-04-30 | CVE-2025-4125 | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file. | Ispsoft | 9.8 | ||
2021-01-26 | CVE-2020-27280 | A use after free issue has been identified in the way ISPSoft(v3.12 and prior) processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution. | Ispsoft | 7.8 | ||
2024-01-18 | CVE-2023-5131 | A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution. | Ispsoft | 8.8 | ||
2018-10-03 | CVE-2018-14800 | Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application. | Ispsoft | 7.8 |