📦 Exaopc
by Yokogawa
🔍 What is Exaopc?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability affects Yokogawa Electric industrial control systems where default Windows account passwords remain unchanged from initial configuration. Attackers can gain unauthorized access to c...
This vulnerability involves hard-coded credentials in Yokogawa Electric's CENTUM VP and Exaopc products, allowing attackers to gain unauthorized access to CAMS server applications. Affected organizati...
This path traversal vulnerability in Yokogawa's CAMS for HIS Log Server allows attackers to access arbitrary files on affected systems. It affects industrial control systems including CENTUM CS 3000, ...
This vulnerability in Yokogawa's Long-term Data Archive Package service creates named pipes with improper access control lists (ACLs), allowing unauthorized users to potentially read, write, or delete...
This vulnerability in Yokogawa's 'Root Service' allows attackers to exploit improperly configured named pipe ACLs, potentially enabling privilege escalation or unauthorized access. It affects CENTUM C...
CVE-2022-22729 is an authentication bypass vulnerability in Yokogawa's CAMS for HIS Server that allows attackers to send specially crafted packets to bypass authentication mechanisms. This affects ind...