{"api_version":"1","generated_at":"2026-04-21T10:21:18+00:00","cve":"CVE-2018-10201","urls":{"html":"https://cve.report/CVE-2018-10201","api":"https://cve.report/api/cve/CVE-2018-10201.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-10201","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-10201"},"summary":{"title":"CVE-2018-10201","description":"An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-04-20 08:29:00","updated_at":"2018-05-16 01:29:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es","name":"https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es","refsource":"MISC","tags":["Third Party Advisory"],"title":"Blog de Seguridad","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/44497/","name":"44497","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"Ncomputing vSpace Pro 10/11 - Directory Traversal - Windows webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kwell.net/kwell_blog/?p=5199","name":"http://www.kwell.net/kwell_blog/?p=5199","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"CVE-2018-10201 – Ncomputing vSpace Pro Directory Traversal Vulnerability | Kwell – Blog de Seguridad","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch","name":"https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch","refsource":"CONFIRM","tags":[],"title":"POPUP","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-10201","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10201","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"10201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ncomputing","cpe5":"vspace_pro","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"10201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ncomputing","cpe5":"vspace_pro","cpe6":"11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"10201","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ncomputing","cpe5":"vspace_pro","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"10201","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ncomputing","cpe5":"vspace_pro","cpe6":"11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-10201","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es","refsource":"MISC","url":"https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es"},{"name":"44497","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/44497/"},{"name":"http://www.kwell.net/kwell_blog/?p=5199","refsource":"MISC","url":"http://www.kwell.net/kwell_blog/?p=5199"},{"name":"https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch","refsource":"CONFIRM","url":"https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch"}]}},"nvd":{"publishedDate":"2018-04-20 08:29:00","lastModifiedDate":"2018-05-16 01:29:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ncomputing:vspace_pro:11:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"10201","Ordinal":"126636","Title":"CVE-2018-10201","CVE":"CVE-2018-10201","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"10201","Ordinal":"1","NoteData":"An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\\ or ..../ or ....\\ as a directory-traversal pattern to TCP port 8667.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"10201","Ordinal":"2","NoteData":"2018-04-20","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"10201","Ordinal":"3","NoteData":"2018-05-14","Type":"Other","Title":"Modified"}]}}}