{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-19T04:52:17.511","vulnerabilities":[{"cve":{"id":"CVE-2023-1419","sourceIdentifier":"secalert@redhat.com","published":"2024-11-17T11:15:05.593","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A script injection vulnerability was found in the Debezium database connector, where it does not properly sanitize some parameters. This flaw allows an attacker to send a malicious request to inject a parameter that may allow the viewing of unauthorized data."},{"lang":"es","value":"Se encontró una vulnerabilidad de inyección de scripts en el conector de base de datos de Debezium, donde no se sanean correctamente algunos parámetros. Esta falla permite que un atacante envíe una solicitud maliciosa para inyectar un parámetro que puede permitir la visualización de datos no autorizados."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-233"}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-1419","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178722","source":"secalert@redhat.com"}]}}]}