Search criteria
3 vulnerabilities found for vspace_pro by ncomputing
FKIE_CVE-2018-10201
Vulnerability from fkie_nvd - Published: 2018-04-20 08:29 - Updated: 2024-11-21 03:41
Severity ?
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.kwell.net/kwell_blog/?p=5199 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch | ||
| cve@mitre.org | https://www.exploit-db.com/exploits/44497/ | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kwell.net/kwell_blog/?p=5199 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44497/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ncomputing | vspace_pro | 10 | |
| ncomputing | vspace_pro | 11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4B4787-4102-4583-9ED3-861F0823213C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ncomputing:vspace_pro:11:*:*:*:*:*:*:*",
"matchCriteriaId": "19989773-0D6F-44C7-8FEA-4E8E1D2ABB69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en NcMonitorServer.exe en NC Monitor Server en NComputing vSpace Pro 10 y 11. Es posible leer archivos arbitrarios fuera del directorio root del servidor web. Esta vulnerabilidad podr\u00eda ser explotada de forma remota por una URL manipulada sin credenciales, con .../ o ...\\ o ..../ o ....\\ como patrones de salto de directorio al puerto TCP 8667."
}
],
"id": "CVE-2018-10201",
"lastModified": "2024-11-21T03:41:00.460",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-20T08:29:00.240",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"source": "cve@mitre.org",
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-10201 (GCVE-0-2018-10201)
Vulnerability from cvelistv5 – Published: 2018-04-20 08:00 – Updated: 2024-08-05 07:32
VLAI?
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:32:01.645Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-04-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-15T02:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es",
"refsource": "MISC",
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"name": "http://www.kwell.net/kwell_blog/?p=5199",
"refsource": "MISC",
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"name": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch",
"refsource": "CONFIRM",
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-10201",
"datePublished": "2018-04-20T08:00:00",
"dateReserved": "2018-04-18T00:00:00",
"dateUpdated": "2024-08-05T07:32:01.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-10201 (GCVE-0-2018-10201)
Vulnerability from nvd – Published: 2018-04-20 08:00 – Updated: 2024-08-05 07:32
VLAI?
Summary
An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:32:01.645Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-04-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-15T02:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es",
"refsource": "MISC",
"url": "https://www.kwell.net/kwell/index.php?option=com_newsfeeds\u0026view=newsfeed\u0026id=15\u0026Itemid=173\u0026lang=es"
},
{
"name": "44497",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44497/"
},
{
"name": "http://www.kwell.net/kwell_blog/?p=5199",
"refsource": "MISC",
"url": "http://www.kwell.net/kwell_blog/?p=5199"
},
{
"name": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch",
"refsource": "CONFIRM",
"url": "https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-10201",
"datePublished": "2018-04-20T08:00:00",
"dateReserved": "2018-04-18T00:00:00",
"dateUpdated": "2024-08-05T07:32:01.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}