Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-pgp-desktop/", "name": "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-pgp-desktop/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/23938", "name": "23938", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.kb.cert.org/vuls/id/102465", "name": "VU#102465", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://www.securityfocus.com/bid/22247", "name": "22247", "tags": [], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1017563", "name": "1017563", "tags": [], "refsource": "SECTRACK"}, {"url": "http://securityreason.com/securityalert/2203", "name": "2203", "tags": [], "refsource": "SREASON"}, {"url": "http://osvdb.org/32969", "name": "32969", "tags": [], "refsource": "OSVDB"}, {"url": "http://osvdb.org/32970", "name": "32970", "tags": [], "refsource": "OSVDB"}, {"url": "http://archives.neohapsis.com/archives/vulnwatch/2007-q1/0025.html", "name": "20070125 Medium Risk Vulnerability in PGP Desktop", "tags": [], "refsource": "VULNWATCH"}, {"url": "http://www.vupen.com/english/advisories/2007/0356", "name": "ADV-2007-0356", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.securityfocus.com/archive/1/458137/100/0/threaded", "name": "20070125 Medium Risk Vulnerability in PGP Desktop", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "PGP Desktop before 9.5.1 does not validate data objects received over the (1) \\pipe\\pgpserv named pipe for PGPServ.exe or the (2) \\pipe\\pgpsdkserv named pipe for PGPsdkServ.exe, which allows remote authenticated users to gain privileges by sending a data object representing an absolute pointer, which causes code execution at the corresponding address."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-0603", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2007-01-30T18:28Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:pgp:corporate_desktop:9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-16T16:33Z"}