{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T12:13:23.501","vulnerabilities":[{"cve":{"id":"CVE-2018-1000540","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:02.210","lastModified":"2024-11-21T03:40:09.413","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LoboEvolution version < 9b75694cedfa4825d4a2330abf2719d470c654cd contains a XML External Entity (XXE) vulnerability in XML Parsing when viewing the XML file in the browser that can result in disclosure of confidential data, denial of service, server side request forgery. This attack appear to be exploitable via Specially crafted XML file."},{"lang":"es","value":"LoboEvolution en versiones anteriores al commit con ID 9b75694cedfa4825d4a2330abf2719d470c654cd contiene una vulnerabilidad de XEE (XML External Entity) en el análisis de XML al ver el archivo XML en el navegador. Esto puede resultar en la divulgación de datos confidenciales, una denegación de servicio (DoS) o Server-Side Request Forgery (SSRF). Este ataque parece ser explotable mediante un archivo XML especialmente manipulado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:loboevolution_project:loboevolution:*:*:*:*:*:*:*:*","versionEndExcluding":"0.99.3","matchCriteriaId":"86283F65-7BC3-46BB-A51A-E0C92B07C851"}]}]}],"references":[{"url":"https://github.com/oswetto/LoboEvolution/issues/38","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/oswetto/LoboEvolution/issues/38","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}