Filtered by vendor Hornerautomation Subscriptions
Total 35 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-32539 1 Hornerautomation 2 Cscape, Cscape Envisionrv 2024-11-20 7.8 High
Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e3c04. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
CVE-2023-32203 1 Hornerautomation 2 Cscape, Cscape Envisionrv 2024-11-20 7.8 High
Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e374b. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2023-31278 1 Hornerautomation 2 Cscape, Cscape Envisionrv 2024-11-20 7.8 High
Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
CVE-2023-7206 1 Hornerautomation 1 Cscape 2024-11-13 7.8 High
In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape.
CVE-2022-2640 1 Hornerautomation 2 Rcc972, Rcc972 Firmware 2024-09-17 7.5 High
The Config-files of Horner Automation’s RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP).
CVE-2022-30540 1 Hornerautomation 1 Cscape 2024-09-17 7.8 High
The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code
CVE-2022-2642 1 Hornerautomation 2 Rcc972, Rcc972 Firmware 2024-09-17 7.5 High
Horner Automation’s RCC 972 firmware version 15.40 contains global variables. This could allow an attacker to read out sensitive values and variable keys from the device.
CVE-2022-2641 1 Hornerautomation 2 Rcc972, Rcc972 Firmware 2024-09-17 9.8 Critical
Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.
CVE-2019-6555 1 Hornerautomation 1 Cscape 2024-09-16 7.8 High
Cscape, 9.80 SP4 and prior. An improper input validation vulnerability may be exploited by processing specially crafted POC files. This may allow an attacker to read confidential information and remotely execute arbitrary code.
CVE-2022-29488 1 Hornerautomation 1 Cscape 2024-09-16 7.8 High
The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code.
CVE-2022-27184 1 Hornerautomation 1 Cscape 2024-09-16 7.8 High
The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.
CVE-2022-28690 1 Hornerautomation 1 Cscape 2024-09-16 7.8 High
The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code.
CVE-2021-44462 1 Hornerautomation 1 Cscape Envisionrv 2024-09-16 7.8 High
This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior. The issues result from the lack of proper validation of user-supplied data, which can result in reads and writes past the end of allocated data structures. User interaction is required to exploit this vulnerability as an attacker must trick a valid user to open a malicious HMI project file.
CVE-2018-19005 1 Hornerautomation 1 Cscape 2024-08-05 N/A
Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code.
CVE-2019-13545 1 Hornerautomation 1 Cscape 2024-08-04 7.8 High
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
CVE-2019-13541 1 Hornerautomation 1 Cscape 2024-08-04 7.8 High
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.
CVE-2021-32995 1 Hornerautomation 1 Cscape 2024-08-03 7.8 High
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-33015 1 Hornerautomation 1 Cscape 2024-08-03 7.8 High
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write via an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-32975 1 Hornerautomation 1 Cscape 2024-08-03 7.8 High
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-22678 1 Hornerautomation 1 Cscape 2024-08-03 7.8 High
Cscape (All versions prior to 9.90 SP4) lacks proper validation of user-supplied data when parsing project files. This could lead to memory corruption. An attacker could leverage this vulnerability to execute code in the context of the current process.