CVE-2023-28686
Published Mar 24, 2023
Last updated a year ago
Overview
- Description
- Dino before 0.2.3, 0.3.x before 0.3.2, and 0.4.x before 0.4.2 allows attackers to modify the personal bookmark store via a crafted message. The attacker can change the display of group chats or force a victim to join a group chat; the victim may then be tricked into disclosing sensitive information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 4.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-639
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:dino:dino:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C1028D4-918B-4FBB-A87B-909BE83D0703", "versionEndExcluding": "0.2.3" }, { "criteria": "cpe:2.3:a:dino:dino:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C6DBD26-1958-4668-81F5-57EC5FE68D66", "versionEndExcluding": "0.3.2", "versionStartIncluding": "0.3.0" }, { "criteria": "cpe:2.3:a:dino:dino:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C2CF482-9F37-40CE-86DA-6188A5CDF3EC", "versionEndExcluding": "0.4.2", "versionStartIncluding": "0.4.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" } ], "operator": "OR" } ] } ]