2 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. Un atacante podría explotar esta vulnerabilidad, lo que provocaría la lectura de archivos desde Honeywell Experion ControlEdge VirtualUOC y ControlEdge UOC. • https://process.honeywell.com https://www.honeywell.com/us/en/product-security • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-36: Absolute Path Traversal •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. Un atacante podría explotar esta vulnerabilidad, lo que permitiría modificar archivos en Honeywell Experion VirtualUOC y UOC. • https://process.honeywell.com https://www.honeywell.com/us/en/product-security • CWE-749: Exposed Dangerous Method or Function •