Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.securityfocus.com/bid/17958", "name": "17958", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/19845", "name": "19845", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/19846", "name": "19846", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.kb.cert.org/vuls/id/477960", "name": "VU#477960", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://secunia.com/advisories/20136", "name": "20136", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.osvdb.org/25463", "name": "25463", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/25569", "name": "25569", "tags": [], "refsource": "OSVDB"}, {"url": "http://securityreason.com/securityalert/901", "name": "901", "tags": [], "refsource": "SREASON"}, {"url": "http://www.vupen.com/english/advisories/2006/1786", "name": "ADV-2006-1786", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/1842", "name": "ADV-2006-1842", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/1785", "name": "ADV-2006-1785", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://marc.info/?l=full-disclosure&m=114764338702488&w=2", "name": "20060514 POC exploit for freeSSHd version 1.0.9", "tags": [], "refsource": "FULLDISC"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26442", "name": "freesshd-key-exchange-bo(26442)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/434415/30/4920/threaded", "name": "20060517 Re:POC exploit for freeFTPd 1.0.10", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/434415/100/0/threaded", "name": "20060517 BUGTRAQ:20060517 Re:POC exploit for freeFTPd 1.0.10", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/434402/100/0/threaded", "name": "20060517 POC exploit for freeFTPd 1.0.10", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/434038/100/0/threaded", "name": "20060515 Re: [Full-disclosure] POC exploit for freeSSHd version 1.0.9", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/434007/100/0/threaded", "name": "20060514 POC exploit for freeSSHd version 1.0.9", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-2407", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-05-16T10:02Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:freesshd:freesshd:1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:weonlydo:wodsshserver:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:weonlydo:wodsshserver:1.3.3_demo:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:freeftpd:freeftpd:1.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-18T16:39Z"}