Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hornerautomation cscape 9.90 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-31244
The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-31278
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2023-29503
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Hornerautomation Cscape 9.90
Hornerautomation Cscape Envisionrv 4.70
7.8
CVSSv3
CVE-2019-13545
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
Hornerautomation Cscape
7.8
CVSSv3
CVE-2019-13541
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an malicious user to access information and remotely execute arbitrary code.
Hornerautomation Cscape
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3