{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:07:27.948","vulnerabilities":[{"cve":{"id":"CVE-2023-40166","sourceIdentifier":"security-advisories@github.com","published":"2023-08-25T21:15:08.777","lastModified":"2024-11-21T08:18:54.703","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++."},{"lang":"es","value":"Notepad++ es un editor de código fuente gratuito y de código abierto. Las versiones 8.5.6 y anteriores son vulnerables al desbordamiento de lectura del búfer de montón en `FileManager::detectLanguageFromTextBegining`. La explotabilidad de este problema no está clara. Potencialmente, puede ser utilizado para filtrar información de asignación de memoria interna. En el momento de la publicación, no hay parches conocidos disponibles en las versiones existentes de Notepad++.\n"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"},{"lang":"en","value":"CWE-122"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*","versionEndIncluding":"8.5.6","matchCriteriaId":"51C2BF99-30E2-4BFC-B6BE-DBB33C6C6FEF"}]}]}],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}