24 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-31488",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-10T20:15:45.330",
"lastModified": "2024-01-11T13:57:35.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document."
},
{
"lang": "es",
"value": "Las versiones de Hyland Perceived Filters anteriores al 8 de diciembre de 2023 (por ejemplo, 11.4.0.2647), tal como se utilizan en el software Cisco IronPort Email Security Appliance, Cisco Secure Email Gateway y varios productos que no son de Cisco, permiten a los atacantes desencadenar un fallo de segmentaci\u00f3n y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento manipulado."
}
],
"metrics": {},
"references": [
{
"url": "https://bst.cisco.com/quickview/bug/CSCwe11003",
"source": "cve@mitre.org"
}
]
}