{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T07:52:10.517","vulnerabilities":[{"cve":{"id":"CVE-2018-1437","sourceIdentifier":"psirt@us.ibm.com","published":"2018-03-14T00:29:00.373","lastModified":"2024-11-21T03:59:49.130","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565."},{"lang":"es","value":"IBM Notes 8.5 y 9.0 podría permitir que un atacante ejecute código arbitrario en el sistema. Esto ha sido provocado por un error relacionado con múltiples rutas de búsqueda no fiables. Un atacante local podría explotar esta vulnerabilidad de secuestro de DLL para ejecutar código arbitrario en el sistema o provocar que la aplicación se cierre inesperadamente. IBM X-Force ID: 139565."}],"metrics":{"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5:*:*:*:*:*:*:*","matchCriteriaId":"3F7D9C09-7257-493B-9DDB-F310FBA93AC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"D950A9B5-EECB-4101-8D16-CB2E6A6077A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.1:*:*:*:*:*:*:*","matchCriteriaId":"AC345FBA-BDE8-443A-8B90-FB394AE9C31C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*","matchCriteriaId":"72683B62-0BB1-4FB2-8661-447FCF535885"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.2:*:*:*:*:*:*:*","matchCriteriaId":"F11A6454-9322-467F-B305-820A54A1EC8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*","matchCriteriaId":"5FBB9A06-5600-4174-A4A5-C85059DDE4B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.3:*:*:*:*:*:*:*","matchCriteriaId":"BB9D342A-15AA-4627-8BB5-4F99271265B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*","matchCriteriaId":"99D14E8F-303F-4BE3-9BC4-0646B71A8660"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*","matchCriteriaId":"C9ABFF78-233F-4413-AE17-C290D50E2E87"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:9.0.1:*:*:*:*:*:*:*","matchCriteriaId":"FF1783BE-BA10-43E6-89DB-DBEAFDC7416B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*","matchCriteriaId":"C0946E0E-508F-49D0-BBA8-8CB725BDD3D9"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22014201","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/103401","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040563","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139565","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22014201","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/103401","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1040563","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139565","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}}]}