{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T09:46:21.588","vulnerabilities":[{"cve":{"id":"CVE-2007-4798","sourceIdentifier":"cve@mitre.org","published":"2007-09-10T21:17:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in invscout in Inventory Scout in invscout.rte in IBM AIX 5.2 and 5.3 allows local users to delete system files that have names matching the final substring of a hostname alias, as demonstrated by hostnames ending in \"unix\"."},{"lang":"es","value":"Vulnerabilidad no especificada en invscout en Inventory Scout en invscout.rte en IBM AIX 5.2 y 5.3 permite a usuarios locales borrar archivos del sistema que tengan nombres que validan el final de la cadena un alias de un nombre de host, como se demostró con la finalización de un nombre de host en \"unix\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:C/A:C","baseScore":6.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"17EECCCB-D7D1-439A-9985-8FAE8B44487B"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507"}]}]}],"references":[{"url":"http://osvdb.org/40393","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/26715","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98506","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/25556","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2007/3059","source":"cve@mitre.org"},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3846","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3847","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36447","source":"cve@mitre.org"},{"url":"http://osvdb.org/40393","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/26715","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY98506","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/25556","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2007/3059","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3846","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3847","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36447","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}