{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T17:46:48.680","vulnerabilities":[{"cve":{"id":"CVE-2018-10598","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2018-08-13T21:47:58.743","lastModified":"2024-11-21T03:41:38.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has two out-of-bounds read vulnerabilities could cause the software to crash due to lacking user input validation for processing project files. Which may allow an attacker to gain remote code execution with administrator privileges if exploited."},{"lang":"es","value":"CNCSoft en versiones 1.00.83 y anteriores con ScreenEditor 1.00.54 tiene dos vulnerabilidades de lectura fuera de límites que pueden causar que el software se cierre de manera inesperada debido a la falta de validación de entrada de datos del usuario para procesar los archivos de proyecto. Esto puede permitir a un atacante ejecutar código remotamente con privilegios de administrador si se explota."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deltaww:cncsoft:*:*:*:*:*:*:*:*","versionEndIncluding":"1.00.83","matchCriteriaId":"46010F57-6A69-40E9-9DE7-C7DE7842A42B"},{"vulnerable":true,"criteria":"cpe:2.3:a:deltaww:screeneditor:1.00.54:*:*:*:*:*:*:*","matchCriteriaId":"15FBE451-6312-49DD-831C-3DD512DA2A31"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105032","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01","source":"ics-cert@hq.dhs.gov","tags":["Mitigation","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/105032","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory","US Government Resource"]}]}}]}