Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:netgain-systems:enterprise_manager:*:*:*:*:free:*:*:*", "matchCriteriaId": "10DEC2C4-1A3A-4ED7-B1D2-832CD7C32C05", "versionEndExcluding": "10.0.57", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "NetGain Enterprise Manager (EM) is affected by OS Command Injection vulnerabilities in versions before 10.0.57. These vulnerabilities could allow remote authenticated attackers to inject arbitrary code, resulting in remote code execution."}, {"lang": "es", "value": "NetGain Enterprise Manager (EM) se ha visto afectado por vulnerabilidades de inyecci\u00f3n de comandos en las versiones anteriores a la 10.0.57. Estas vulnerabilidades podr\u00edan permitir que los atacantes remotos autenticados inyecten c\u00f3digo arbitrario, lo que resultar\u00eda en la ejecuci\u00f3n remota de c\u00f3digo."}], "id": "CVE-2018-10587", "lastModified": "2024-11-21T03:41:36.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-11-01T17:29:00.327", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-004"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}