Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
honeywell vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-8269
Multiple stack-based buffer overflows in (1) HWOPOSScale.ocx and (2) HWOPOSSCANNER.ocx in Honeywell OPOS Suite prior to 1.13.4.15 allow remote malicious users to execute arbitrary code via a crafted file that is improperly handled by the Open method.
Honeywell Opos Suite
6.1
CVSSv3
CVE-2018-8714
Honeywell MatrikonOPC OPC Controller prior to 5.1.0.0 allows local users to transfer arbitrary files from a host computer and consequently obtain sensitive information via vectors related to MSXML libraries.
Honeywell Matrikonopc Explorer
7.5
CVSSv3
CVE-2020-27274
Some parsing functions in the affected product do not check the return value of malloc and the thread handling the message is forced to close, which may lead to a denial-of-service condition on the OPC UA Tunneller (versions before 6.3.0.8233).
Honeywell Opc Ua Tunneller
7.5
CVSSv3
CVE-2020-27295
The affected product has uncontrolled resource consumption issues, which may allow an malicious user to cause a denial-of-service condition on the OPC UA Tunneller (versions before 6.3.0.8233).
Honeywell Opc Ua Tunneller
9.8
CVSSv3
CVE-2020-27297
The affected product is vulnerable to a heap-based buffer overflow, which may allow an malicious user to manipulate memory with controlled values and remotely execute code on the OPC UA Tunneller (versions before 6.3.0.8233).
Honeywell Opc Ua Tunneller
9.1
CVSSv3
CVE-2020-27299
The affected product is vulnerable to an out-of-bounds read, which may allow an malicious user to obtain and disclose sensitive data information or cause the device to crash on the OPC UA Tunneller (versions before 6.3.0.8233).
Honeywell Opc Ua Tunneller
6.5
CVSSv3
CVE-2022-30245
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configurat...
Honeywell Alerton Compass 1.6.5
8.8
CVSSv3
CVE-2022-1261
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Honeywell Matrikon Opc Server
9.8
CVSSv3
CVE-2014-9187
Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules, which could lead to possible remote code execution or denial of service. Honeywell strongly en...
Honeywell Experion Process Knowledge System
9.8
CVSSv3
CVE-2014-9189
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial o...
Honeywell Experion Process Knowledge System
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »