{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T18:02:30.871","vulnerabilities":[{"cve":{"id":"CVE-2007-5327","sourceIdentifier":"cve@mitre.org","published":"2007-10-13T00:17:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stack-based buffer overflow in the RPC interface for the Message Engine (mediasvr.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a long argument in the 0x10d opnum."},{"lang":"es","value":"Desbordamiento de búfer basado en pila en el interfaz RPC para el Message Engine (mediasvr.exe) en el  CA BrightStor ARCServe BackUp v9.01 hasta la R11.5 y el Enterprise Backup r10.5, permite a atacantes remotos ejecutar código de su elección a través de la inclusión de un argumento largo en el 0x10d opnum."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*","matchCriteriaId":"F52790F8-0D23-47F4-B7F7-6CB0F7B6EA14"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*","matchCriteriaId":"443AB333-2C99-42FF-8F4E-A487BF588E85"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*","matchCriteriaId":"8C339825-77F9-478A-B1F7-A297D5715396"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*","matchCriteriaId":"E37161BE-6AF5-40E0-BD63-2C17431D8B36"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*","matchCriteriaId":"477EE032-D183-478F-A2BF-6165277A7414"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*","matchCriteriaId":"78AA54EA-DAF1-4635-AA1B-E2E49C4BB597"}]}]}],"references":[{"url":"http://ruder.cdut.net/blogview.asp?logID=231","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/27192","source":"cve@mitre.org"},{"url":"http://securityreason.com/securityalert/3218","source":"cve@mitre.org"},{"url":"http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.fortiguardcenter.com/advisory/FGA-2007-11.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/482112/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/482121/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26015","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1018805","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2007/3470","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37064","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37065","source":"cve@mitre.org"},{"url":"http://ruder.cdut.net/blogview.asp?logID=231","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/27192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityreason.com/securityalert/3218","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.fortiguardcenter.com/advisory/FGA-2007-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/482112/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/482121/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26015","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1018805","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/3470","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37064","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37065","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}