{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T11:49:30.707","vulnerabilities":[{"cve":{"id":"CVE-2018-1205","sourceIdentifier":"security_alert@emc.com","published":"2018-03-27T21:29:00.797","lastModified":"2024-11-21T03:59:23.513","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Dell EMC ScaleIO, versions prior to 2.5, do not properly handle some packet data in the MDM service. As a result, a remote attacker could potentially send specifically crafted packet data to the MDM service causing it to crash."},{"lang":"es","value":"Dell EMC ScaleIO, en versiones anteriores a la 2.5, no gestiona correctamente algunos datos de paquetes en el servicio MDM. Como resultado, un atacante remoto podría enviar datos de paquetes especialmente manipulados al servicio MDM, lo que provocaría su cierre inesperado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:emc_scaleio:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5","matchCriteriaId":"DF2A63E9-84E6-4BD4-82BA-F7C39960E9FD"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2018/Mar/59","source":"security_alert@emc.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2018/Mar/59","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]}]}}]}