{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:18:45.572","vulnerabilities":[{"cve":{"id":"CVE-2023-44389","sourceIdentifier":"security-advisories@github.com","published":"2023-10-04T21:15:10.360","lastModified":"2024-11-21T08:25:48.073","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6."},{"lang":"es","value":"Zope es un servidor de aplicaciones web de código abierto. La propiedad title, disponible en la mayoría de los objetos Zope, se puede utilizar para almacenar código de script que se ejecuta mientras se visualiza el objeto afectado en Zope Management Interface (ZMI). Todas las versiones de Zope 4 y Zope 5 se ven afectadas. Los parches se lanzarán con las versiones 4.8.11 y 5.8.6 de Zope."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.5,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.8.11","matchCriteriaId":"945F18A2-06BA-4B4B-A159-C98E0C2AD2E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.8.6","matchCriteriaId":"7FB6AD5C-64B6-4EDE-B24F-38D833200E41"}]}]}],"references":[{"url":"https://github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}