Hornerautomation

Cscape

31 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 08.05.2025 17:45:03
  • Last modified 12.05.2025 17:32:52

Horner Automation Cscape version 10.0 (10.0.415.2) SP1 is vulnerable to an out-of-bounds read vulnerability that could allow an attacker to disclose information and execute arbitrary code on affected installations of Cscape.

  • EPSS 0.03%
  • Published 13.12.2024 01:15:11
  • Last modified 13.12.2024 01:15:11

Horner Automation Cscape contains a memory corruption vulnerability, which could allow an attacker to disclose information and execute arbitrary code.

  • EPSS 0.03%
  • Published 13.12.2024 01:15:05
  • Last modified 13.12.2024 01:15:05

The vulnerability occurs in the parsing of CSP files. The issues result from the lack of proper validation of user-supplied data, which could allow reading past the end of allocated data structures, resulting in execution of arbitrary code.

  • EPSS 0.04%
  • Published 15.01.2024 23:15:07
  • Last modified 21.11.2024 08:45:30

In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape.

  • EPSS 0.06%
  • Published 06.06.2023 17:15:15
  • Last modified 21.11.2024 08:02:53

Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e374b. An attacker could leverage this vulnerability to execute arbitrary...

  • EPSS 0.06%
  • Published 06.06.2023 17:15:14
  • Last modified 21.11.2024 08:01:43

Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the contex...

  • EPSS 0.04%
  • Published 06.06.2023 17:15:14
  • Last modified 21.11.2024 08:01:41

The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer. ...

  • EPSS 0.05%
  • Published 06.06.2023 17:15:13
  • Last modified 21.11.2024 07:57:11

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the con...

  • EPSS 0.05%
  • Published 06.06.2023 17:15:13
  • Last modified 21.11.2024 07:55:44

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code...

  • EPSS 0.06%
  • Published 06.06.2023 17:15:13
  • Last modified 21.11.2024 07:53:41

The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code i...