Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://metasploit.com/research/vulns/pgp_slackspace/", "name": "http://metasploit.com/research/vulns/pgp_slackspace/", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/15784", "name": "15784", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/17827", "name": "17827", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.osvdb.org/21569", "name": "21569", "tags": [], "refsource": "OSVDB"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html", "name": "20051208 PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer", "tags": [], "refsource": "FULLDISC"}, {"url": "http://www.securityfocus.com/archive/1/419654/100/0/threaded", "name": "20051216 Update on the PGP NTFS File Wipe Issue, 16 Dec 2005", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/419282/100/0/threaded", "name": "20051211 Status on PGP NTFS File Wipe issue, 11 Dec 2005", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/419077/100/0/threaded", "name": "20051209 PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The Wipe Free Space utility in PGP Desktop Home 8.0 and Desktop Professional 9.0.3 Build 2932 and earlier does not clear file slack space in the last cluster for the file, which allows local users to access the previous contents of the disk."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2005-4151", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "LOW", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2005-12-10T11:03Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:pgp:desktop:*:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.0.3_build_2932"}, {"cpe23Uri": "cpe:2.3:a:pgp:desktop:8.0:*:home:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:pgp:desktop:9.0:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:40Z"}