Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://bugs.gentoo.org/show_bug.cgi?id=122376", "name": "http://bugs.gentoo.org/show_bug.cgi?id=122376", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://bugs.gentoo.org/show_bug.cgi?id=125902", "name": "http://bugs.gentoo.org/show_bug.cgi?id=125902", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://bugs.gentoo.org/show_bug.cgi?id=127167", "name": "http://bugs.gentoo.org/show_bug.cgi?id=127167", "tags": [], "refsource": "MISC"}, {"url": "http://bugs.gentoo.org/show_bug.cgi?id=127319", "name": "http://bugs.gentoo.org/show_bug.cgi?id=127319", "tags": [], "refsource": "MISC"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200603-23.xml", "name": "GLSA-200603-23", "tags": ["Patch"], "refsource": "GENTOO"}, {"url": "http://www.securityfocus.com/bid/17217", "name": "17217", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/19376", "name": "19376", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.osvdb.org/24104", "name": "24104", "tags": [], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25528", "name": "gentoo-multiple-games-privilege-escalation(25528)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/428743/100/0/threaded", "name": "20060324 Re: [ GLSA 200603-23 ] NetHack, Slash'EM, Falcon's Eye: Local privilege escalation", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/428739/100/0/threaded", "name": "20060324 Re: [ GLSA 200603-23 ] NetHack, Slash'EM, Falcon's Eye: Localprivilege escalation", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-1390", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}}, "publishedDate": "2006-03-25T00:06Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-18T16:32Z"}