U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-1000

Change History

New CVE Received by NIST 4/27/2024 5:15:08 AM

Action Type Old Value New Value
Added CVSS V2

								
							
							
						
VulDB (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
VulDB AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Added CWE

								
							
							
						
VulDB CWE-77
Added Description

								
							
							
						
A vulnerability was found in cyanomiko dcnnt-py up to 0.9.0. It has been classified as critical. Affected is the function main of the file dcnnt/plugins/notifications.py of the component Notification Handler. The manipulation leads to command injection. It is possible to launch the attack remotely. Upgrading to version 0.9.1 is able to address this issue. The patch is identified as b4021d784a97e25151a5353aa763a741e9a148f5. It is recommended to upgrade the affected component. VDB-262230 is the identifier assigned to this vulnerability.
Added Reference

								
							
							
						
VulDB https://github.com/cyanomiko/dcnnt-py/commit/b4021d784a97e25151a5353aa763a741e9a148f5 [No types assigned]
Added Reference

								
							
							
						
VulDB https://github.com/cyanomiko/dcnnt-py/pull/23 [No types assigned]
Added Reference

								
							
							
						
VulDB https://github.com/cyanomiko/dcnnt-py/releases/tag/0.9.1 [No types assigned]
Added Reference

								
							
							
						
VulDB https://vuldb.com/?ctiid.262230 [No types assigned]
Added Reference

								
							
							
						
VulDB https://vuldb.com/?id.262230 [No types assigned]