Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Omron Subscribe
Filtered by product Cx-position
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-25959 1 Omron 1 Cx-position 2022-04-08 6.8 MEDIUM 7.8 HIGH
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.
CVE-2022-26022 1 Omron 1 Cx-position 2022-04-08 6.8 MEDIUM 7.8 HIGH
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.
CVE-2022-26419 1 Omron 1 Cx-position 2022-04-08 6.8 MEDIUM 7.8 HIGH
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.
CVE-2022-26417 1 Omron 1 Cx-position 2022-04-08 6.8 MEDIUM 7.8 HIGH
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.
CVE-2020-27257 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2021-02-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
CVE-2020-27261 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2021-02-10 6.8 MEDIUM 8.8 HIGH
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
CVE-2020-27259 1 Omron 4 Cx-one, Cx-position, Cx-protocol and 1 more 2021-02-10 6.8 MEDIUM 8.8 HIGH
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.