{ "schema_version": "1.4.0", "id": "GHSA-r9jm-c64m-grf2", "modified": "2022-05-14T01:34:00Z", "published": "2022-05-14T01:34:00Z", "aliases": [ "CVE-2018-16196" ], "details": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16196" }, { "type": "WEB", "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "type": "WEB", "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106442" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-01-09T23:29:00Z" } }