Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
omron vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-22357
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overw...
Omron Cp1l-el20dr-d Firmware
7.8
CVSSv3
CVE-2023-22366
CX-Motion-MCH v2.32 and previous versions contains an access of uninitialized pointer vulnerability. Having a user to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
Omron Cx-motion-mch Firmware
7.8
CVSSv3
CVE-2022-45793
Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated malicious user to overwrite files which will result in code execution with privileges of a different user.
Omron Automation Software Sysmac Studio
6.5
CVSSv3
CVE-2018-16207
PowerAct Pro Master Agent for Windows Version 5.13 and previous versions allows authenticated malicious users to bypass access restriction to alter or edit unauthorized files via unspecified vectors.
Omron Poweract Pro Master Agent
7.8
CVSSv3
CVE-2019-10971
The application (Network Configurator for DeviceNet Safety 3.41 and prior) searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application's direct control and outside the intended directories.
Omron Network Configurator For Devicenet Safety
8.8
CVSSv3
CVE-2019-18251
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.
Omron Cx-supervisor
Teamviewer Teamviewer 5.0.8703 Qs
NA
CVE-2000-0704
Buffer overflow in SGI Omron WorldView Wnn allows remote malicious users to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.
Wnn Wnn4 4.2.2tl
Wnn Wnn4 4.2.5tl
Freewnn Freewnn 1.0
Freewnn Freewnn 1.1
Wnn Wnn4 4.2.8
Freewnn Freewnn 1.1.1 Axxx
Omron Worldview 6.5
1 EDB exploit
7.8
CVSSv3
CVE-2021-27413
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an malicious user to execute arbitrary code.
NA
CVE-2011-0517
Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and previous versions, when Run TCP/IP server is enabled, allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
Sielcosistemi Winlog Pro
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9