Show plain JSON{"id": "CVE-2007-2616", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-05-11T16:19:00.000", "references": [{"url": "http://download.novell.com/Download?buildid=Ad2xk29hHTg~", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=532", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/35941", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25204", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/23916", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1018045", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/1732", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34221", "source": "cve@mitre.org"}, {"url": "http://download.novell.com/Download?buildid=Ad2xk29hHTg~", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=532", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/35941", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25204", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/23916", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1018045", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2007/1732", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34221", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in the SSL version of the NMDMC.EXE service in Novell NetMail 3.52e FTF2 and probably earlier allows remote attackers to execute arbitrary code via a crafted request."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la versi\u00f3n SSL del servicio NMDMC.EXE en Novell NetMail 3.52e FTF2 y posiblemente anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una respuesta manipulada."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:novell:netmail:3.52:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C29DA27E-7392-4A63-A00B-77C74A53AA13"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE363E3B-D4C9-4D3D-B68B-EBFCFD0BA811"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0B2C678-9E49-42B7-82F0-6A9A3684AFBD"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBD5601B-6726-4AB2-A0FC-ADAFA4F984DF"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52c1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F18E4EF3-A1F0-4461-861C-4C3D98EBF7DE"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6760C499-934D-46ED-B304-EC4C69355E40"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3763405C-3FE7-497A-86F1-4C7FD197CF03"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52e:ftf1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BF3DDA7-522C-4B67-94E1-A2B93C0C58F5"}, {"criteria": "cpe:2.3:a:novell:netmail:3.52e:ftf2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61C344D-3999-4275-BF96-7BE20D7A831F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}