Логотип exploitDog
bind:CVE-2023-5389
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-5389

Количество 3

Количество 3

nvd логотип

CVE-2023-5389

около 2 лет назад

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-h7wp-7q3v-7m5w

около 2 лет назад

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2024-00879

около 2 лет назад

Уязвимость компонента Configuration Handler интерфейса микропрограммного обеспечения модульных контроллеров Honeywell Experion ControlEdge VirtualUOC и ControlEdge UOC , позволяющая нарушителю выполнить произвольный код

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-5389

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

CVSS3: 9.1
0%
Низкий
около 2 лет назад
github логотип
GHSA-h7wp-7q3v-7m5w

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

CVSS3: 9.1
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-00879

Уязвимость компонента Configuration Handler интерфейса микропрограммного обеспечения модульных контроллеров Honeywell Experion ControlEdge VirtualUOC и ControlEdge UOC , позволяющая нарушителю выполнить произвольный код

CVSS3: 9.1
0%
Низкий
около 2 лет назад

Уязвимостей на страницу