Max CVSS | 10.0 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-17896 | 9.3 |
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify
|
09-10-2019 - 23:37 | 12-10-2018 - 14:29 | |
CVE-2018-17898 | 7.8 |
Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to prevent memory exhaustion by unauthorized requests. This could allow an attacker to cause the controller to become unstable.
|
09-10-2019 - 23:37 | 12-10-2018 - 14:29 | |
CVE-2018-17900 | 5.0 |
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers.
|
09-10-2019 - 23:37 | 12-10-2018 - 14:29 | |
CVE-2018-17902 | 5.0 |
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.
|
09-10-2019 - 23:37 | 12-10-2018 - 14:29 | |
CVE-2018-10592 | 10.0 |
Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized admin
|
09-10-2019 - 23:32 | 31-07-2018 - 17:29 |