{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T05:27:41.519","vulnerabilities":[{"cve":{"id":"CVE-2022-3377","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2022-11-15T21:15:37.950","lastModified":"2024-11-21T07:19:24.177","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read.\n\n"},{"lang":"es","value":"Cscape versión 9.90 SP 6 y anteriores de Horner Automation no valida correctamente los datos proporcionados por el usuario. Si un usuario abre un archivo FNT formado con fines malintencionados, un atacante podría ejecutar código arbitrario dentro del proceso actual accediendo a un puntero no inicializado, lo que provocaría una lectura de memoria fuera de los límites."}],"metrics":{"cvssMetricV31":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-824"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*","versionEndExcluding":"9.90","matchCriteriaId":"EE2DC26D-983D-42DF-A903-1AFC1430EB07"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*","matchCriteriaId":"F3037FE7-0230-48F0-8665-3F63F4D57AFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*","matchCriteriaId":"419F775A-9EC9-4C78-9834-D241D18E67AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*","matchCriteriaId":"A20012C0-21A9-42BD-AF6A-CC193A3631FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*","matchCriteriaId":"D62ADB7C-09CC-4A36-BD7C-235029100510"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*","matchCriteriaId":"35C25D54-A7DD-43D0-8A4C-EF274B8EAB65"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp5:*:*:*:*:*:*","matchCriteriaId":"289190F6-E74B-4869-B47B-734A965A0C3F"},{"vulnerable":true,"criteria":"cpe:2.3:a:hornerautomation:cscape:9.90:sp6:*:*:*:*:*:*","matchCriteriaId":"B4EEABB9-4AD6-4F42-975D-5D4A50047EA6"}]}]}],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03","source":"ics-cert@hq.dhs.gov","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]}]}}]}