{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T05:18:59.908","vulnerabilities":[{"cve":{"id":"CVE-2018-7837","sourceIdentifier":"cybersecurity@se.com","published":"2018-12-24T16:29:00.983","lastModified":"2024-11-21T04:12:51.130","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Restriction of XML External Entity Reference ('XXE') vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow the software to resolve documents outside of the intended sphere of control, causing the software to embed incorrect documents into its output and expose restricted information."},{"lang":"es","value":"Existe una vulnerabilidad de restricción incorrecta de XEE (XML External Entity) en numerosos métodos del software de IIoT Monitor 3.1.38 que podría permitir que el software resuelva documentos fuera de la esfera de control planeada, provocando que el software embeba documentos incorrectos en su entrada y exponga información restringida."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:iiot_monior:3.1.38:*:*:*:*:*:*:*","matchCriteriaId":"B2F8DD41-8532-4663-A759-82022E2CEF0A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106484","source":"cybersecurity@se.com","tags":["Third Party Advisory"]},{"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106484","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}