2023-05-29 02:00:31 +00:00
{
"id" : "CVE-2023-31874" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-05-29T00:15:09.867" ,
2023-05-30 14:00:30 +00:00
"lastModified" : "2023-05-30T12:52:56.613" ,
"vulnStatus" : "Awaiting Analysis" ,
2023-05-29 02:00:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Yank Note (YN) 3.52.1 allows execution of arbitrary code when a crafted file is opened, e.g., via nodeRequire('child_process')."
2023-05-30 14:00:30 +00:00
} ,
{
"lang" : "es" ,
"value" : "Yank Note (YN) 3.52.1 permite la ejecuci\u00f3n de c\u00f3digo arbitrario cuando se abre un archivo manipulado, por ejemplo: \"via nodeRequire('child_process')\"."
2023-05-29 02:00:31 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html" ,
"source" : "cve@mitre.org"
}
]
}