The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer.
2023-06-06T17:15:14.360
2024-11-21T08:01:41.860
Modified
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | hornerautomation | cscape | 9.90 | Yes |
Application | hornerautomation | cscape_envisionrv | 4.70 | Yes |