{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:46:45.070","vulnerabilities":[{"cve":{"id":"CVE-2023-5395","sourceIdentifier":"psirt@honeywell.com","published":"2024-04-17T17:15:12.850","lastModified":"2024-11-21T08:41:41.190","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n"},{"lang":"es","value":"El servidor que recibe un mensaje con formato incorrecto que utiliza el nombre de host en una tabla interna puede causar un desbordamiento de la pila que resulta en una posible ejecución remota de código. Consulte la Notificación de seguridad de Honeywell para obtener recomendaciones sobre actualización y control de versiones."}],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@honeywell.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"references":[{"url":"https:\/\/process.honeywell.com","source":"psirt@honeywell.com"},{"url":"https:\/\/process.honeywell.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}