📦 Fast\/tools
by Yokogawa
🔍 What is Fast\/tools?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Yokogawa's FAST/TOOLS allows web servers to be accessed directly by IP address, making them susceptible to automated scanning and potential worm attacks. Affected systems include...
The OPTIONS method vulnerability in Yokogawa FAST/TOOLS web servers exposes HTTP method information that could aid attackers in reconnaissance and subsequent attacks. This affects industrial control s...
A URL encoding vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to manipulate web pages or execute malicious scripts. This affects multiple components (RVSVRN, UNSVRN,...
Yokogawa FAST/TOOLS industrial control system software uses weak cryptographic algorithms, potentially allowing attackers to decrypt web server communications. This affects FAST/TOOLS packages RVSVRN,...
This vulnerability in Yokogawa's FAST/TOOLS software allows attackers to potentially decrypt communications by exploiting support for outdated SSL/TLS versions. It affects FAST/TOOLS packages RVSVRN, ...
A path traversal vulnerability in Yokogawa's FAST/TOOLS software allows attackers to bypass URL validation and access arbitrary files on the web server. This affects FAST/TOOLS packages RVSVRN, UNSVRN...
A Cross-Site Request Forgery (CSRF) vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to compromise user accounts when victims click malicious links. This affects multi...
A host header injection vulnerability in Yokogawa FAST/TOOLS allows attackers to redirect users to malicious websites by manipulating request headers. This affects FAST/TOOLS packages RVSVRN, UNSVRN, ...
This vulnerability in Yokogawa's FAST/TOOLS software exposes detailed error messages that could reveal sensitive system information. Attackers could leverage this information to plan further attacks a...
This vulnerability in Yokogawa FAST/TOOLS involves insecure response header settings that could allow attackers to redirect users to malicious websites. It affects FAST/TOOLS packages RVSVRN, UNSVRN, ...
A content sniffing vulnerability in Yokogawa's FAST/TOOLS software allows attackers to execute malicious scripts by exploiting unspecified MIME types. This affects industrial control systems using FAS...
This vulnerability in Yokogawa's FAST/TOOLS industrial control system software exposes library version information on web pages, potentially enabling attackers to gather reconnaissance data for furthe...
A vulnerability in Yokogawa's FAST/TOOLS software allows browser autocomplete to save sensitive input data from web interfaces. This affects industrial control system operators using FAST/TOOLS packag...