{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:50:13.844","vulnerabilities":[{"cve":{"id":"CVE-2023-5396","sourceIdentifier":"psirt@honeywell.com","published":"2024-04-17T17:15:13.060","lastModified":"2024-11-21T08:41:41.310","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Server receiving a malformed message creates connection for a hostname that may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n"},{"lang":"es","value":"El servidor que recibe un mensaje con formato incorrecto crea una conexión para un nombre de host que puede causar un desbordamiento de la pila, lo que resulta en una posible ejecución remota de código. Consulte la Notificación de seguridad de Honeywell para obtener recomendaciones sobre actualización y control de versiones."}],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:H\/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.2}]},"weaknesses":[{"source":"psirt@honeywell.com","type":"Secondary","description":[{"lang":"en","value":"CWE-805"}]}],"references":[{"url":"https:\/\/process.honeywell.com","source":"psirt@honeywell.com"},{"url":"https:\/\/process.honeywell.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}