Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.securityfocus.com/bid/20702", "name": "20702", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/22546", "name": "22546", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://packetstormsecurity.org/0610-exploits/Derdirigent.txt", "name": "http://packetstormsecurity.org/0610-exploits/Derdirigent.txt", "tags": [], "refsource": "MISC"}, {"url": "http://www.osvdb.org/29950", "name": "29950", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29951", "name": "29951", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29952", "name": "29952", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29953", "name": "29953", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29954", "name": "29954", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29955", "name": "29955", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29956", "name": "29956", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29957", "name": "29957", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29958", "name": "29958", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.osvdb.org/29959", "name": "29959", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.vupen.com/english/advisories/2006/4164", "name": "ADV-2006-4164", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29760", "name": "der-dirigent-cfgdedi-file-include(29760)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in Der Dirigent (DeDi) 1.0.3 allow remote attackers to execute arbitrary PHP code via a URL in the cfg_dedi[dedi_path] parameter in (1) find.php, (2) insert_line.php, (3) fullscreen.php, (4) changecase.php, (5) insert_link.php, (6) insert_table.php, (7) table_cellprop.php, (8) table_prop.php, (9) table_rowprop.php, (10) insert_page.php, and possibly insert_marquee.php in backend/external/wysiswg/popups/."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-94"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-5507", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}}, "publishedDate": "2006-10-25T22:07Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:der_dirigent:der_dirigent:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-20T01:33Z"}