A vulnerability was found in cyanomiko dcnnt-py up to 0.9.0. It has been classified as critical. Affected is the function main of the file dcnnt/plugins/notifications.py of the component Notification Handler. The manipulation leads to command injection. It is possible to launch the attack remotely. Upgrading to version 0.9.1 is able to address this issue. The patch is identified as b4021d784a97e25151a5353aa763a741e9a148f5. It is recommended to upgrade the affected component. VDB-262230 is the identifier assigned to this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cyanomiko/dcnnt-py/commit/b4021d784a97e25151a5353aa763a741e9a148f5 - | |
References | () https://github.com/cyanomiko/dcnnt-py/pull/23 - | |
References | () https://github.com/cyanomiko/dcnnt-py/releases/tag/0.9.1 - | |
References | () https://vuldb.com/?ctiid.262230 - | |
References | () https://vuldb.com/?id.262230 - |
14 May 2024, 12:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Apr 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-27 09:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-1000
Mitre link : CVE-2023-1000
CVE.ORG link : CVE-2023-1000
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')