Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf", "name": "http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf", "tags": [], "refsource": "MISC"}, {"url": "http://openbsd.org/errata39.html#022_route6", "name": "[3.9] 20070423 022: SECURITY FIX: April 23, 2007", "tags": [], "refsource": "OPENBSD"}, {"url": "http://openbsd.org/errata40.html#012_route6", "name": "[4.0] 20070423 012: SECURITY FIX: April 23, 2007", "tags": [], "refsource": "OPENBSD"}, {"url": "http://www.securityfocus.com/bid/23615", "name": "23615", "tags": ["Patch"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/24978", "name": "24978", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:03.ipv6.asc", "name": "FreeBSD-SA-07:03.ipv6", "tags": [], "refsource": "FREEBSD"}, {"url": "http://secunia.com/advisories/25033", "name": "25033", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/25068", "name": "25068", "tags": [], "refsource": "SECUNIA"}, {"url": "https://issues.rpath.com/browse/RPL-1310", "name": "https://issues.rpath.com/browse/RPL-1310", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/25083", "name": "25083", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2007-0347.html", "name": "RHSA-2007:0347", "tags": [], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/25288", "name": "25288", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/archive/1/471457", "name": "20070615 rPSA-2007-0124-1 kernel xen", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://docs.info.apple.com/article.html?artnum=306375", "name": "http://docs.info.apple.com/article.html?artnum=306375", "tags": [], "refsource": "CONFIRM"}, {"url": "http://docs.info.apple.com/article.html?artnum=305712", "name": "http://docs.info.apple.com/article.html?artnum=305712", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171", "name": "MDKSA-2007:171", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196", "name": "MDKSA-2007:196", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:216", "name": "MDKSA-2007:216", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html", "name": "SUSE-SA:2007:051", "tags": [], "refsource": "SUSE"}, {"url": "http://www.ubuntu.com/usn/usn-486-1", "name": "USN-486-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.ubuntu.com/usn/usn-508-1", "name": "USN-508-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.kb.cert.org/vuls/id/267289", "name": "VU#267289", "tags": ["US Government Resource"], "refsource": "CERT-VN"}, {"url": "http://www.securitytracker.com/id?1017949", "name": "1017949", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/25691", "name": "25691", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/25770", "name": "25770", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/26133", "name": "26133", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/26651", "name": "26651", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/26703", "name": "26703", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/26620", "name": "26620", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/26664", "name": "26664", "tags": [], "refsource": "SECUNIA"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html", "name": "SUSE-SA:2008:006", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/28806", "name": "28806", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2007/2270", "name": "ADV-2007-2270", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/3050", "name": "ADV-2007-3050", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/1563", "name": "ADV-2007-1563", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33851", "name": "openbsd-ipv6-type0-dos(33851)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9574", "name": "oval:org.mitre.oval:def:9574", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/467939/30/6690/threaded", "name": "20070508 FLEA-2007-0016-1: kernel", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-2242", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "severity": "HIGH", "impactScore": 6.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2007-04-25T16:19Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}, {"cpe23Uri": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ietf:ipv6:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}, {"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ietf:ipv6:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "operator": "AND", "cpe_match": []}, {"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}, {"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ietf:ipv6:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-16T16:42Z"}