Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.trendmicro.com/ftp/documentation/readme/osce_80_win_en_securitypatch_b1042_readme.txt", "name": "http://www.trendmicro.com/ftp/documentation/readme/osce_80_win_en_securitypatch_b1042_readme.txt", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/25778", "name": "25778", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=558", "name": "20070716 Trend Micro OfficeScan Management Console Authorization Bypass Vulnerability", "tags": [], "refsource": "IDEFENSE"}, {"url": "http://www.securityfocus.com/bid/24641", "name": "24641", "tags": [], "refsource": "BID"}, {"url": "http://www.securityfocus.com/bid/24935", "name": "24935", "tags": [], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id?1018320", "name": "1018320", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www.vupen.com/english/advisories/2007/2330", "name": "ADV-2007-2330", "tags": [], "refsource": "VUPEN"}, {"url": "http://osvdb.org/36628", "name": "36628", "tags": [], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35052", "name": "officescan-cgichkmasterpwd-security-bypass(35052)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "cgiChkMasterPwd.exe before 8.0.0.142 in Trend Micro OfficeScan Corporate Edition 8.0 allows remote attackers to bypass the password requirement and gain access to the Management Console via an empty hash and empty encrypted password string, related to \"stored decrypted user logon information.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-3455", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2007-06-27T00:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:trend_micro:officescan:8.0:*:corporate:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-29T01:32Z"}