Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.symantec.com/avcenter/security/Content/2007.06.01.html", "name": "http://www.symantec.com/avcenter/security/Content/2007.06.01.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/24194", "name": "24194", "tags": [], "refsource": "BID"}, {"url": "http://seer.entsupport.symantec.com/docs/288627.htm", "name": "http://seer.entsupport.symantec.com/docs/288627.htm", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securitytracker.com/id?1018188", "name": "1018188", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/25537", "name": "25537", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2007/2035", "name": "ADV-2007-2035", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://osvdb.org/36104", "name": "36104", "tags": [], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34680", "name": "symantec-scheduler-security-bypass(34680)", "tags": [], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/470562/100/0/threaded", "name": "20070605 TPTI-07-08: Symantec Veritas Storage Foundation Scheduler Service Authentication Bypass Vulnerability", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\\VxSvc\\CurrentVersion\\Schedules specifying future command execution."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-2279", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2007-06-04T16:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:windows:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-16T16:42Z"}