Page 2 of 32 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

06 Jun 2023 — The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in Cscape!CANPortMigration. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-04 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

09 Mar 2023 — Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds read vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in reads past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

09 Mar 2023 — Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

09 Mar 2023 — Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

27 Oct 2022 — Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read. Cscape versión 9.90 SP 6 y anteriores de Horner Automation no valida correctamente los datos proporcionados por el usuario. Si un usuario abre un archivo FNT formado con fines malintencionados, un atacante podr... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03 • CWE-824: Access of Uninitialized Pointer •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

27 Oct 2022 — Horner Automation's Cscape version 9.90 SP 7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory write. Horner Automation´s Cscape versión 9.90 SP 7 y anteriores no valida correctamente los datos proporcionados por el usuario. Si un usuario abre un archivo FNT formado con fines malintencionados, un atacante podr... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03 • CWE-824: Access of Uninitialized Pointer •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

27 Oct 2022 — Horner Automation's Cscape version 9.90 SP7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by writing outside the memory buffer. Horner Automation´s Cscape versión 9.90 SP 7 y anteriores no validan correctamente los datos proporcionados por el usuario. Si un usuario abre un archivo FNT formado con fines malintencionados, un atacante podría ejecutar código arbitrario dentro del pr... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

01 Jun 2022 — The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code El producto afectado es vulnerable a un desbordamiento de búfer en la región heap de la memoria por medio de un puntero no inicializado, lo que puede permitir a un atacante ejecutar código arbitrario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-02 • CWE-122: Heap-based Buffer Overflow CWE-824: Access of Uninitialized Pointer •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

01 Jun 2022 — The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code. El producto afectado es vulnerable a una lectura fuera de límites por medio de un puntero no inicializado, lo que puede permitir a un atacante ejecutar código arbitrario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-02 • CWE-125: Out-of-bounds Read CWE-824: Access of Uninitialized Pointer •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

01 Jun 2022 — The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code. El producto afectado es vulnerable a una escritura fuera de límites por medio de un puntero no inicializado, lo que puede permitir a un atacante ejecutar código arbitrario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-02 • CWE-787: Out-of-bounds Write CWE-824: Access of Uninitialized Pointer •