Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hornerautomation cscape 9.90 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-32289
The affected application lacks proper validation of user-supplied data when parsing project files (e.g.., CSP). This could lead to an out-of-bounds read in IO_CFG. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
NA
CVE-2023-28653
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
NA
CVE-2023-27916
The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
6.8
CVSSv2
CVE-2019-13545
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
Hornerautomation Cscape
6.8
CVSSv2
CVE-2019-13541
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an malicious user to access information and remotely execute arbitrary code.
Hornerautomation Cscape
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
malicious code
camera
CVE-2023-46694
CVE-2023-43847
CVE-2023-30311
CVE-2024-27842
CVE-2024-30165
arbitrary code
CVE-2024-21683
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3