{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:15:55.476","vulnerabilities":[{"cve":{"id":"CVE-2018-1000835","sourceIdentifier":"cve@mitre.org","published":"2018-12-20T15:29:01.610","lastModified":"2024-11-21T03:40:27.540","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning."},{"lang":"es","value":"KeePassDX, en versiones iguales o anteriores a la 2.5.0.0beta17, contiene una vulnerabilidad XEE (XML External Entity) en el analizador de archivos kdbx que puede resultar en la divulgación de datos confidenciales, denegación de servicio, SSRF o escaneo de puertos."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"FDEF3A3F-4F7E-40A2-9D54-90A12FC69BA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta10:*:*:*:*:*:*","matchCriteriaId":"7A080CE1-892A-45C5-8270-151440455AD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta11:*:*:*:*:*:*","matchCriteriaId":"DDEF2FD0-8A9E-469D-8CAA-67E9B54A571F"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta12:*:*:*:*:*:*","matchCriteriaId":"95BD174C-342F-489D-8F28-B7ECB974A334"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta13:*:*:*:*:*:*","matchCriteriaId":"2E176DD3-81D3-4E56-8B24-4CFF97DEAFF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta14:*:*:*:*:*:*","matchCriteriaId":"3C0F1C7B-90D5-455E-B054-F059F11DFE2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta15:*:*:*:*:*:*","matchCriteriaId":"9C4A92A1-456B-4A0D-A914-A060B8180762"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta16:*:*:*:*:*:*","matchCriteriaId":"AB55EEEC-9D5C-4FB7-97B9-40C29C8C8C1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta17:*:*:*:*:*:*","matchCriteriaId":"79891186-F5EE-4208-B141-C3760AE8DC8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta2:*:*:*:*:*:*","matchCriteriaId":"9C936C0D-AC70-48F3-8AB1-55B575CE07C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta3:*:*:*:*:*:*","matchCriteriaId":"7FC5033E-0B61-45B0-8E50-0E5149610EF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta4:*:*:*:*:*:*","matchCriteriaId":"36F13105-AB21-4FFE-B16F-97CB34578011"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta5:*:*:*:*:*:*","matchCriteriaId":"287C3518-9234-4C1A-B742-29C119F1F232"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta6:*:*:*:*:*:*","matchCriteriaId":"D9835F42-C0E2-48C7-867C-0EF6B3F5C75E"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta7:*:*:*:*:*:*","matchCriteriaId":"332DAF45-6DC2-4698-B498-29E3A3E75137"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta8:*:*:*:*:*:*","matchCriteriaId":"F7BD9C0A-00E3-45F4-ADCA-692B25243910"},{"vulnerable":true,"criteria":"cpe:2.3:a:keepassdx:keepass_dx:2.5.0.0:beta9:*:*:*:*:*:*","matchCriteriaId":"7BB3AD0A-B0C1-4F95-B31B-19FD31322AEF"}]}]}],"references":[{"url":"https://0dd.zone/2018/10/28/KeePassDX-XXE/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/Kunzisoft/KeePassDX/issues/200","source":"cve@mitre.org","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://0dd.zone/2018/10/28/KeePassDX-XXE/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/Kunzisoft/KeePassDX/issues/200","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]}]}}]}