Lucene search

K
OmronCx-position

7 matches found

CVE
CVE
added 2021/02/09 3:15 p.m.113 views

CVE-2020-27257

This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.

7.8CVSS8AI score0.00525EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.78 views

CVE-2022-26419

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.

7.8CVSS7.9AI score0.00642EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.71 views

CVE-2022-26022

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.

7.8CVSS7.9AI score0.00194EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.70 views

CVE-2022-26417

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.

7.8CVSS7.9AI score0.00265EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.64 views

CVE-2022-25959

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.

7.8CVSS8AI score0.00194EPSS
CVE
CVE
added 2021/02/09 3:15 p.m.40 views

CVE-2020-27261

The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

8.8CVSS8.9AI score0.01247EPSS
CVE
CVE
added 2021/02/09 3:15 p.m.36 views

CVE-2020-27259

The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.

8.8CVSS8.9AI score0.00476EPSS