Omron CX-Server 5.0.23

CPE Details

Omron CX-Server 5.0.23
5.0.23
2019-01-07
18h56 +00:00
2021-04-23
15h01 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:omron:cx-server:5.0.23:*:*:*:*:*:*:*

Informations

Vendor

omron

Product

cx-server

Version

5.0.23

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-27413 2021-05-13 16h56 +00:00 Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
7.8
High
CVE-2020-27257 2021-02-09 14h10 +00:00 This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
7.8
High
CVE-2020-27261 2021-02-09 14h09 +00:00 The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
8.8
High
CVE-2020-27259 2021-02-09 14h09 +00:00 The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
8.8
High
CVE-2018-18989 2018-12-04 21h00 +00:00 In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
7.8
High
CVE-2018-18993 2018-12-04 21h00 +00:00 Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
7.8
High