Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hornerautomation vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-32289
The affected application lacks proper validation of user-supplied data when parsing project files (e.g.., CSP). This could lead to an out-of-bounds read in IO_CFG. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-28653
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-31244
The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-31278
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-27916
The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2019-13545
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
Hornerautomation Cscape
7.8
CVSSv3
CVE-2019-13541
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an malicious user to access information and remotely execute arbitrary code.
Hornerautomation Cscape
7.5
CVSSv3
CVE-2022-2642
Horner Automation’s RCC 972 firmware version 15.40 contains global variables. This could allow an malicious user to read out sensitive values and variable keys from the device.
Hornerautomation Rcc972 Firmware 15.40
7.5
CVSSv3
CVE-2022-2640
The Config-files of Horner Automation’s RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an malicious user to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext ...
Hornerautomation Rcc972 Firmware 15.40
9.8
CVSSv3
CVE-2022-2641
Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an malicious user to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.
Hornerautomation Rcc972 Firmware 15.40
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »