{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:59:39.870","vulnerabilities":[{"cve":{"id":"CVE-2007-5325","sourceIdentifier":"cve@mitre.org","published":"2007-10-13T00:17:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in (1) the Message Engine and (2) AScore.dll in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allow remote attackers to execute arbitrary code via unspecified vectors."},{"lang":"es","value":"Múltiples desbordamientos de búfer en (1) el Motor de Mensajería (Message Engine) y (2) AScore.dll de CA BrightStor ARCServe BackUp v9.01 hasta R11.5, y Enterprise Backup r10.5, permiten a atacantes remotos ejecutar código de su elección a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*","matchCriteriaId":"F52790F8-0D23-47F4-B7F7-6CB0F7B6EA14"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*","matchCriteriaId":"443AB333-2C99-42FF-8F4E-A487BF588E85"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*","matchCriteriaId":"8C339825-77F9-478A-B1F7-A297D5715396"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*","matchCriteriaId":"E37161BE-6AF5-40E0-BD63-2C17431D8B36"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*","matchCriteriaId":"477EE032-D183-478F-A2BF-6165277A7414"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*","matchCriteriaId":"78AA54EA-DAF1-4635-AA1B-E2E49C4BB597"}]}]}],"references":[{"url":"http://secunia.com/advisories/27192","source":"cve@mitre.org"},{"url":"http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/archive/1/482121/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26015","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1018805","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2007/3470","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37063","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/27192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/archive/1/482121/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26015","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1018805","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/3470","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37063","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}