CVE-2015-0986

Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:moxa:vport_activex_sdk_plus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://www.moxa.com/support/download.aspx?d_id=2114 - Patch () http://www.moxa.com/support/download.aspx?d_id=2114 - Patch
References () http://www.securityfocus.com/bid/73960 - () http://www.securityfocus.com/bid/73960 -
References () http://www.zerodayinitiative.com/advisories/ZDI-15-392 - () http://www.zerodayinitiative.com/advisories/ZDI-15-392 -
References () https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01 - Third Party Advisory, US Government Resource

Information

Published : 2015-05-26 15:59

Updated : 2025-04-12 10:46


NVD link : CVE-2015-0986

Mitre link : CVE-2015-0986

CVE.ORG link : CVE-2015-0986


JSON object : View

Products Affected

moxa

  • vport_activex_sdk_plus
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer