Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://seer.entsupport.symantec.com/docs/297171.htm", "name": "http://seer.entsupport.symantec.com/docs/297171.htm", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.symantec.com/avcenter/security/Content/2008.02.04.html", "name": "http://www.symantec.com/avcenter/security/Content/2008.02.04.html", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/27487", "name": "27487", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/28787", "name": "28787", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-003.html", "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-003.html", "tags": [], "refsource": "MISC"}, {"url": "http://www.securitytracker.com/id?1019303", "name": "1019303", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www.vupen.com/english/advisories/2008/0413", "name": "ADV-2008-0413", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://www.exploit-db.com/exploits/5078", "name": "5078", "tags": [], "refsource": "EXPLOIT-DB"}, {"url": "http://www.securityfocus.com/archive/1/487688/100/0/threaded", "name": "20080206 ZDI-08-003: Symantec Backup Exec Remote File Upload Vulnerability", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Unrestricted file upload vulnerability in the FileUpload class running on the Symantec LiveState Apache Tomcat server, as used by Symantec Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote attackers to upload and execute arbitrary JSP files via unknown vectors."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-20"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-0457", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2008-02-07T21:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:symantec:backupexec_system_recovery:7.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:symantec:backupexec_system_recovery:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-15T22:00Z"}