cvelist/2023/36xxx/CVE-2023-36993.json

62 lines
1.8 KiB
JSON
Raw Normal View History

2023-06-28 05:00:55 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2023-07-07 19:00:37 +00:00
"ID": "CVE-2023-36993",
"STATE": "PUBLIC"
2023-06-28 05:00:55 +00:00
},
2023-07-07 19:00:37 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2023-06-28 05:00:55 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-07-07 19:00:37 +00:00
"value": "The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bramdoessecurity.com/travianz-hacked/",
"refsource": "MISC",
"name": "https://bramdoessecurity.com/travianz-hacked/"
2023-06-28 05:00:55 +00:00
}
]
}
}