cvelist/2023/5xxx/CVE-2023-5223.json

105 lines
3.6 KiB
JSON
Raw Normal View History

2023-09-27 15:00:05 +00:00
{
2023-09-27 16:01:49 +00:00
"data_version": "4.0",
2023-09-27 15:00:05 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5223",
2023-09-27 16:01:49 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2023-09-27 15:00:05 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-27 16:01:49 +00:00
"value": "A vulnerability, which was classified as critical, has been found in HimitZH HOJ up to 4.6-9a65e3f. This issue affects some unknown processing of the component Topic Handler. The manipulation leads to sandbox issue. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240365 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in HimitZH HOJ bis 4.6-9a65e3f entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Komponente Topic Handler. Durch Manipulation mit unbekannten Daten kann eine sandbox issue-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-265 Sandbox Issue",
"cweId": "CWE-265"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "HimitZH",
"product": {
"product_data": [
{
"product_name": "HOJ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.6-9a65e3f"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.240365",
"refsource": "MISC",
"name": "https://vuldb.com/?id.240365"
},
{
"url": "https://vuldb.com/?ctiid.240365",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.240365"
},
{
"url": "https://github.com/payI0ad/cves/issues/1",
"refsource": "MISC",
"name": "https://github.com/payI0ad/cves/issues/1"
}
]
},
"credits": [
{
"lang": "en",
"value": "payIoad (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
2023-10-25 17:37:17 +00:00
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
2023-09-27 15:00:05 +00:00
}
]
}
}