{"containers":{"cna":{"affected":[{"platforms":["Windows"],"product":"NeoRS","vendor":"DOUZONE BIZON Co.,Ltd","versions":[{"lessThanOrEqual":"2021.3.10.1","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Origin validation error vulnerability in NeoRS’s ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-346","description":"CWE-346 Origin Validation Error","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-28T13:49:01.000Z","orgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","shortName":"krcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788"}],"source":{"discovery":"UNKNOWN"},"title":"DOUZONE BIZON NeoRS file download and execute vulnerability","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vuln@krcert.or.kr","ID":"CVE-2022-23763","STATE":"PUBLIC","TITLE":"DOUZONE BIZON NeoRS file download and execute vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"NeoRS","version":{"version_data":[{"platform":"Windows","version_affected":"<=","version_value":"2021.3.10.1"}]}}]},"vendor_name":"DOUZONE BIZON Co.,Ltd"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Origin validation error vulnerability in NeoRS’s ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-346 Origin Validation Error"}]}]},"references":{"reference_data":[{"name":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788","refsource":"MISC","url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:51:45.957Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66788"}]}]},"cveMetadata":{"assignerOrgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","assignerShortName":"krcert","cveId":"CVE-2022-23763","datePublished":"2022-06-28T13:49:01.000Z","dateReserved":"2022-01-19T00:00:00.000Z","dateUpdated":"2024-08-03T03:51:45.957Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}