Vulnerabilities (CVE)

Filtered by vendor Omron Subscribe
Filtered by product Cx-one
Total 11 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-21137 1 Omron 1 Cx-one 2024-11-21 6.8 MEDIUM 7.8 HIGH
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.
CVE-2021-27413 1 Omron 2 Cx-one, Cx-server 2024-11-21 6.8 MEDIUM 7.8 HIGH
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
CVE-2020-27261 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2024-11-21 6.8 MEDIUM 8.8 HIGH
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
CVE-2020-27259 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2024-11-21 6.8 MEDIUM 8.8 HIGH
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
CVE-2020-27257 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
CVE-2018-8834 1 Omron 7 Cx-flnet, Cx-one, Cx-programmer and 4 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.
CVE-2018-7530 1 Omron 7 Cx-flnet, Cx-one, Cx-programmer and 4 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
CVE-2018-7514 1 Omron 7 Cx-flnet, Cx-one, Cx-programmer and 4 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.
CVE-2018-19027 1 Omron 2 Cx-one, Cx-protocol 2024-11-21 6.8 MEDIUM 7.8 HIGH
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
CVE-2018-18993 1 Omron 3 Cx-one, Cx-programmer, Cx-server 2024-11-21 6.8 MEDIUM 7.8 HIGH
Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
CVE-2018-18989 1 Omron 3 Cx-one, Cx-programmer, Cx-server 2024-11-21 6.8 MEDIUM 7.8 HIGH
In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.