Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cx\-One
(Omron)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 11 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-01-14 | CVE-2022-21137 | Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code. | Cx\-One | 7.8 | ||
2021-05-13 | CVE-2021-27413 | Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. | Cx\-One, Cx\-Server | 7.8 | ||
2021-02-09 | CVE-2020-27257 | This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. | Cx\-One, Cx\-Position, Cx\-Protocol, Cx\-Server | 7.8 | ||
2021-02-09 | CVE-2020-27261 | The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. | Cx\-One, Cx\-Position, Cx\-Protocol, Cx\-Server | 8.8 | ||
2021-02-09 | CVE-2020-27259 | The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. | Cx\-One, Cx\-Position, Cx\-Protocol, Cx\-Server | 8.8 | ||
2018-04-17 | CVE-2018-8834 | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. | Cx\-Flnet, Cx\-One, Cx\-Programmer, Cx\-Protocol, Cx\-Server, Network_configurator, Switch_box_utility | 7.8 | ||
2018-04-17 | CVE-2018-7530 | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. | Cx\-Flnet, Cx\-One, Cx\-Programmer, Cx\-Protocol, Cx\-Server, Network_configurator, Switch_box_utility | 7.8 | ||
2018-04-17 | CVE-2018-7514 | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. | Cx\-Flnet, Cx\-One, Cx\-Programmer, Cx\-Protocol, Cx\-Server, Network_configurator, Switch_box_utility | 7.8 | ||
2019-01-30 | CVE-2018-19027 | Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. | Cx\-One, Cx\-Protocol | 7.8 | ||
2018-12-04 | CVE-2018-18993 | Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. | Cx\-One, Cx\-Programmer, Cx\-Server | 7.8 |