Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=649", "name": "20080331 Macrovision InstallShield InstallScript One-Click Install Untrusted Library Loading Vulnerability", "tags": [], "refsource": "IDEFENSE"}, {"url": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC&externalId=Q113640", "name": "http://knowledge.macrovision.com/selfservice/microsites/search.do?cmd=displayKC&externalId=Q113640", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/28533", "name": "28533", "tags": ["Patch"], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1019735", "name": "1019735", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/29549", "name": "29549", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2008/1049", "name": "ADV-2008-1049", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41558", "name": "installshield-oneclick-code-execution(41558)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The Macrovision InstallShield InstallScript One-Click Install (OCI) ActiveX control 12.0 before SP2 does not validate the DLL files that are named as parameters to the control, which allows remote attackers to download arbitrary library code onto a client machine."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-94"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-5661", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2008-04-04T00:44Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:macrovision:installshield:*:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "12_premier"}, {"cpe23Uri": "cpe:2.3:a:macrovision:installshield:*:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "12_professional"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-29T01:33Z"}