Cscape, 9.80 SP4 and prior. An improper input validation vulnerability may be exploited by processing specially crafted POC files. This may allow an malicious user to read confidential information and remotely execute arbitrary code.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
hornerautomation cscape |
||
hornerautomation cscape 9.80 |