{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T23:26:30.861","vulnerabilities":[{"cve":{"id":"CVE-2007-2996","sourceIdentifier":"cve@mitre.org","published":"2007-06-04T17:30:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in perl.rte 5.8.0.10 through 5.8.0.95 on IBM AIX 5.2, and 5.8.2.10 through 5.8.2.50 on AIX 5.3, allows local users to gain privileges via unspecified vectors related to the installation and \"waiting for a legitimate user to execute a binary that ships with Perl.\""},{"lang":"es","value":"Vulnerabilidad no especificada en perl.rte 5.8.0.10 hasta la 5.8.0.95 sonre IBM AIX 5.2, y 5.8.2.10 hasta la 5.8.2.50 sobre AIX 5.3, permite a usuarios locales ganar privilegios a través de vectores no especificados relacionado con la instalación y \"esperando por un usuario legítimo para ejecutar un binaro que se transporte con Perl.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:S/C:C/I:C/A:C","baseScore":6.6,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":2.7,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"17EECCCB-D7D1-439A-9985-8FAE8B44487B"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507"}]}]}],"references":[{"url":"ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar.Z","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://osvdb.org/36754","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/25478","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98394","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98395","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY98396&apar=only","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/24241","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1018177","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2007/2004","source":"cve@mitre.org"},{"url":"ftp://aix.software.ibm.com/aix/efixes/security/perl_ifix.tar.Z","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://osvdb.org/36754","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/25478","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98394","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98395","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY98396&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/24241","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1018177","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/2004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}