{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T20:40:34.875","vulnerabilities":[{"cve":{"id":"CVE-2018-8575","sourceIdentifier":"secure@microsoft.com","published":"2018-11-14T01:29:01.770","lastModified":"2024-11-21T04:14:04.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists in Microsoft Project software when it fails to properly handle objects in memory, aka \"Microsoft Project Remote Code Execution Vulnerability.\" This affects Microsoft Project, Office 365 ProPlus, Microsoft Project Server."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución remota de código en el software de Microsoft Project cuando no gestiona correctamente objetos en la memoria. Esto también se conoce como \"Microsoft Project Remote Code Execution Vulnerability\". Esto afecta a Microsoft Project, Office 365 ProPlus y Microsoft Project Server."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*","matchCriteriaId":"CA035812-F35A-43F1-9A8D-EE02201AA10A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"39EA4DCC-AA3F-4E3B-8754-BF79B2FD8657"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"33E26FF2-B80D-4C64-B9D5-ED0DE4BF3B1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2016:*:*:*:*:*:*:*","matchCriteriaId":"5AA3A3C2-DB00-4095-B445-5A5041EB3194"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105807","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1042116","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8575","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105807","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1042116","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8575","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}