{"api_version":"1","generated_at":"2026-04-26T18:39:47+00:00","cve":"CVE-2018-10636","urls":{"html":"https://cve.report/CVE-2018-10636","api":"https://cve.report/api/cve/CVE-2018-10636.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-10636","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-10636"},"summary":{"title":"CVE-2018-10636","description":"CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2018-08-13 21:47:00","updated_at":"2020-08-31 16:11:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/105032","name":"105032","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Delta Electronics CNCSoft and ScreenEditor Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01","refsource":"MISC","tags":["Mitigation","Third Party Advisory","US Government Resource"],"title":"Delta Electronics CNCSoft and ScreenEditor | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-10636","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10636","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"10636","vulnerable":"1","versionEndIncluding":"1.00.83","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"deltaww","cpe5":"cncsoft","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"10636","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"deltaww","cpe5":"screeneditor","cpe6":"1.00.54","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"10636","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"deltaww","cpe5":"screeneditor","cpe6":"1.00.54","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2018-08-08T00:00:00","ID":"CVE-2018-10636","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CNCSoft with ScreenEditor","version":{"version_data":[{"version_value":"CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54"}]}}]},"vendor_name":"ICS-CERT"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"STACK-BASED BUFFER OVERFLOW CWE-121"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-219-01"},{"name":"105032","refsource":"BID","url":"http://www.securityfocus.com/bid/105032"}]}},"nvd":{"publishedDate":"2018-08-13 21:47:00","lastModifiedDate":"2020-08-31 16:11:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:deltaww:screeneditor:1.00.54:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:deltaww:cncsoft:*:*:*:*:*:*:*:*","versionEndIncluding":"1.00.83","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"10636","Ordinal":"127077","Title":"CVE-2018-10636","CVE":"CVE-2018-10636","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"10636","Ordinal":"1","NoteData":"CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"10636","Ordinal":"2","NoteData":"2018-08-13","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"10636","Ordinal":"3","NoteData":"2018-08-14","Type":"Other","Title":"Modified"}]}}}