Логотип exploitDog
bind:CVE-2023-5390
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-5390

Количество 3

Количество 3

nvd логотип

CVE-2023-5390

около 2 лет назад

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qj3p-g2m7-rx94

около 2 лет назад

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-01444

около 2 лет назад

Уязвимость микропрограммного обеспечения модульных контроллеров Honeywell Experion ControlEdge VirtualUOC и ControlEdge UOC , позволяющая нарушителю раскрыть защищаемую информацию или выполнить запись произвольных файлов

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-5390

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-qj3p-g2m7-rx94

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01444

Уязвимость микропрограммного обеспечения модульных контроллеров Honeywell Experion ControlEdge VirtualUOC и ControlEdge UOC , позволяющая нарушителю раскрыть защищаемую информацию или выполнить запись произвольных файлов

CVSS3: 5.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу