"value":"Delta Electronics DIAScreen may write past the end of an allocated \nbuffer while parsing a specially crafted input file. This could allow an\n attacker to execute code in the context of the current process.\n\n"
"value":"\nDelta Electronics has released a new version (v1.3.2) of DIAScreen to address this issue.<br>\nUsers can download it at the <a target=\"_blank\" rel=\"nofollow\" href=\"https://diastudio.deltaww.com/home/downloads?sec=download#catalog\">download center of DIAStudio.</a> (Login required)\n\n<br>"
}
],
"value":"Delta Electronics has released a new version (v1.3.2) of DIAScreen to address this issue.\n\nUsers can download it at the download center of DIAStudio. https://diastudio.deltaww.com/home/downloads \u00a0(Login required)\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"kimiya working with Trend Micro Zero Day Initiative reported this vulnerability to CISA."