Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sublimetext:sublime_text_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "311A202F-CD34-4288-B405-FE9F529883EF", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Sublime Text 3 Build 3126 allows user-assisted attackers to cause a denial of service or possibly have unspecified other impact via a crafted .mkv file. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands, as demonstrated by Ctrl-A, Delete, and Ctrl-Z."}, {"lang": "es", "value": "Sublime Text versi\u00f3n 3 Build 3126, permite a atacantes asistidos por el usuario causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto no especificado por medio de un archivo .mkv especialmente dise\u00f1ado. Un modelo de amenaza es una v\u00edctima que obtiene un archivo especialmente dise\u00f1ado no seguro desde una ubicaci\u00f3n remota y emite varios comandos definidos por el usuario, como es demostrado por Ctrl-A, Delete y Ctrl-Z."}], "id": "CVE-2017-8368", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-07-05T20:29:02.827", "references": [{"source": "cve@mitre.org", "url": "https://github.com/SublimeTextIssues/Core/issues/1700"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8368"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/SublimeTextIssues/Core/issues/1700"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8368"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}