Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html", "name": "[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": ["Vendor Advisory"], "refsource": "MLIST"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html", "name": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html", "name": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "name": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "name": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/28276", "name": "28276", "tags": ["Patch", "Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1019622", "name": "1019622", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://securityreason.com/securityalert/3755", "name": "3755", "tags": ["Third Party Advisory"], "refsource": "SREASON"}, {"url": "http://www.vupen.com/english/advisories/2008/0905/references", "name": "ADV-2008-0905", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "name": "GLSA-201209-25", "tags": ["Third Party Advisory"], "refsource": "GENTOO"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41252", "name": "vmware-config-privilege-escalation(41252)", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded", "name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues", "tags": ["VDB Entry", "Third Party Advisory"], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for \"hijacking the VMX process.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-1363", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2008-03-20T00:44Z", "configurations": {"nodes": [{"children": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.0.1", "versionStartIncluding": "2.0"}, {"cpe23Uri": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.0.6", "versionStartIncluding": "1.0.0"}, {"cpe23Uri": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.0.3", "versionStartIncluding": "2.0"}, {"cpe23Uri": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.0.5", "versionStartIncluding": "1.0"}, {"cpe23Uri": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.0.5", "versionStartIncluding": "1.0"}, {"cpe23Uri": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.5.6", "versionStartIncluding": "5.5"}, {"cpe23Uri": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "6.0.3", "versionStartIncluding": "6.0"}]}], "operator": "AND", "cpe_match": []}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-11-01T16:24Z"}