"value":"A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code."
"value":"<span style=\"background-color: rgb(255, 255, 255);\">Delta Electronics has released </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://diastudio.deltaww.com/home/downloads?sec=download#catalog\">v1.4.2 of DIAScreen</a><span style=\"background-color: rgb(255, 255, 255);\"> and recommends users install this update on all affected systems.</span>\n\n<br>"
}
],
"value":"Delta Electronics has released v1.4.2 of DIAScreen https://diastudio.deltaww.com/home/downloads \u00a0and recommends users install this update on all affected systems."
}
],
"credits":[
{
"lang":"en",
"value":"Natnael Samson (@NattiSamson) working with Trend Micro Zero Day Initiative reported this vulnerability to CISA."