{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T15:40:32.239","vulnerabilities":[{"cve":{"id":"CVE-2007-6211","sourceIdentifier":"cve@mitre.org","published":"2007-12-04T01:46:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Send ICMP Nasty Garbage (sing) on Debian GNU/Linux allows local users to append to arbitrary files and gain privileges via the -L (output log file) option.  NOTE: this issue is only a vulnerability in limited environments, since sing is not installed setuid, and the administrator would need to override a non-setuid default during installation."},{"lang":"es","value":"Send ICMP Nasty Garbage (sing) en Debian GNU/Linux, permite a usuarios locales agregar archivos arbitrarios y alcanzar privilegios por medio de la opción -L (archivo de registro de salida). NOTA: este problema es solo una vulnerabilidad en entornos limitados, ya que en sing no está instalado setuid, y el administrador necesitaría invalidar un valor predeterminado que no sea setuid durante la instalación."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*","matchCriteriaId":"4C8919F1-CD33-437E-9627-69352B276BA3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sing:sing:1.1:*:*:*:*:*:*:*","matchCriteriaId":"90B16B40-EDD2-436A-AD94-5621EAFCA08C"}]}]}],"references":[{"url":"http://osvdb.org/44157","source":"cve@mitre.org"},{"url":"http://securityreason.com/securityalert/3412","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/484472/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/484591/100/200/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/26679","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38822","source":"cve@mitre.org"},{"url":"http://osvdb.org/44157","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityreason.com/securityalert/3412","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/484472/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/484591/100/200/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/26679","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/38822","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}