{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T20:12:32.963","vulnerabilities":[{"cve":{"id":"CVE-2018-0952","sourceIdentifier":"secure@microsoft.com","published":"2018-08-15T17:29:00.207","lastModified":"2024-11-21T03:39:17.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka \"Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability.\" This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers."},{"lang":"es","value":"Existe una vulnerabilidad de elevación de privilegios cuando Diagnostics Hub Standard Collector permite la creación de archivos en ubicaciones arbitrarias. Esto también se conoce como \"Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability\". Esto afecta a Windows Server 2016, Windows 10, Microsoft Visual Studio y Windows 10 Servers."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2015:-:update3:*:*:*:*:*:*","matchCriteriaId":"E8F4DFE9-4F4C-4658-AEFE-6C82367A1D62"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2017:-:*:*:*:*:*:*:*","matchCriteriaId":"CDA983E6-A2DA-48BB-9874-14CF4B3AAE15"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2017:15.8:*:*:*:*:*:*:*","matchCriteriaId":"1146A295-C7BF-4036-9610-9DBC7C8D94AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*","matchCriteriaId":"21540673-614A-4D40-8BD7-3F07723803B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*","matchCriteriaId":"E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*","matchCriteriaId":"AEE2E768-0F45-46E1-B6D7-087917109D98"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*","matchCriteriaId":"83B14968-3985-43C3-ACE5-8307196EFAE3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*","matchCriteriaId":"7CB85C75-4D35-480E-843D-60579EC75FCB"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*","matchCriteriaId":"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*","matchCriteriaId":"5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*","matchCriteriaId":"CAACE735-003E-4ACB-A82E-C0CF97D7F013"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105048","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041466","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0952","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.exploit-db.com/exploits/45244/","source":"secure@microsoft.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/105048","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041466","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0952","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.exploit-db.com/exploits/45244/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]}]}}]}