{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T12:19:36.476","vulnerabilities":[{"cve":{"id":"CVE-2007-3711","sourceIdentifier":"cve@mitre.org","published":"2007-07-11T23:30:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in TOS 2.1.x, 2.2.x before 2.2.5, and 2.5.x before 2.5.2 on TippingPoint IPS allows remote attackers to avoid detection by sending certain fragmented packets."},{"lang":"es","value":"Vulnerabilidad no especificada en TOS 2.1.x, 2.2.x versiones anteriores a 2.2.5, y 2.5.x versiones anteriores a 2.5.2 en TippingPoint IPS permite a atacantes remotos evitar detección al enviar determinados fragmentos de paquetes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:P\/I:P\/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.1:*:*:*:*:*:*:*","matchCriteriaId":"53E6DE7F-8507-4C37-A935-554D9F875C69"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.1.4.6324:*:*:*:*:*:*:*","matchCriteriaId":"6654346B-3574-48D1-9A0B-2750D6FF4D96"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2:*:*:*:*:*:*:*","matchCriteriaId":"78E1B6D6-F779-451E-B4A9-E04D153F7F0C"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"1BCF4262-3F3F-44D7-BE61-1FDCF885C95F"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2.1.6506:*:*:*:*:*:*:*","matchCriteriaId":"276F1810-A4E9-4621-A81A-19EED8146E60"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"272C0A76-2981-42EC-8D85-D33293BE96FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"0F789A9E-34D3-4C17-AAD3-9DA6B940FA45"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"87DD0AC2-05E3-4BE7-8EB6-60FA011AA742"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.5:*:*:*:*:*:*:*","matchCriteriaId":"5B929C12-052F-4A42-B155-7A51152B902A"},{"vulnerable":true,"criteria":"cpe:2.3:o:3com:tippingpoint_ips_tos:2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"2F34B833-674E-4373-A9E1-62EA0A5F690E"}]}]}],"references":[{"url":"http:\/\/archives.neohapsis.com\/archives\/fulldisclosure\/2007-07\/0210.html","source":"cve@mitre.org"},{"url":"http:\/\/osvdb.org\/35969","source":"cve@mitre.org"},{"url":"http:\/\/secunia.com\/advisories\/26017","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http:\/\/www.3com.com\/securityalert\/alerts\/3COM-07-002.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http:\/\/www.cybsec.com\/vuln\/CYBSEC-Security_Pre-Advisory_3Com_TippingPoint_IPS_Detection_Bypass_2.pdf","source":"cve@mitre.org"},{"url":"http:\/\/www.securityfocus.com\/archive\/1\/473394\/100\/0\/threaded","source":"cve@mitre.org"},{"url":"http:\/\/www.securityfocus.com\/bid\/24861","source":"cve@mitre.org"},{"url":"http:\/\/www.securitytracker.com\/id?1018386","source":"cve@mitre.org"},{"url":"http:\/\/www.vupen.com\/english\/advisories\/2007\/2489","source":"cve@mitre.org"},{"url":"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/35343","source":"cve@mitre.org"},{"url":"http:\/\/archives.neohapsis.com\/archives\/fulldisclosure\/2007-07\/0210.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/osvdb.org\/35969","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/secunia.com\/advisories\/26017","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http:\/\/www.3com.com\/securityalert\/alerts\/3COM-07-002.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http:\/\/www.cybsec.com\/vuln\/CYBSEC-Security_Pre-Advisory_3Com_TippingPoint_IPS_Detection_Bypass_2.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.securityfocus.com\/archive\/1\/473394\/100\/0\/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.securityfocus.com\/bid\/24861","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.securitytracker.com\/id?1018386","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http:\/\/www.vupen.com\/english\/advisories\/2007\/2489","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/35343","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}