{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T22:32:51.742","vulnerabilities":[{"cve":{"id":"CVE-2016-7833","sourceIdentifier":"vultures@jpcert.or.jp","published":"2017-06-09T16:29:01.173","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cybozu Dezie 8.0.0 to 8.1.1 allows remote attackers to bypass access restrictions to delete an arbitrary DBM (Cybozu Dezie proprietary format) file via unspecified vectors."},{"lang":"es","value":"Cybozu Dezie versiones 8.0.0 hasta 8.1.1, permite a los atacantes remotos omitir las restricciones de acceso para eliminar un archivo DBM arbitrario (formato propietario de Cybozu Dezie) por medio de vectores no especificados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.2:*:*:*:*:*:*:*","matchCriteriaId":"2C74FC4C-4838-40B8-A9A5-0086F6872DF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.3:*:*:*:*:*:*:*","matchCriteriaId":"467A2959-CB8D-4D37-B10C-F0B9F233A5FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.4:*:*:*:*:*:*:*","matchCriteriaId":"1324C2EF-CC14-48A8-B546-1C1F3B006998"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.5:*:*:*:*:*:*:*","matchCriteriaId":"2F914CF5-030B-4E21-B62F-AEB20EAAD475"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.6:*:*:*:*:*:*:*","matchCriteriaId":"C80BC313-B371-4C04-87B2-BDC5860FF692"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.0.7:*:*:*:*:*:*:*","matchCriteriaId":"25BE2459-79A7-4B3B-AD2E-0E06073E80A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.1.0:*:*:*:*:*:*:*","matchCriteriaId":"15B86451-A4E9-4DA1-AF87-7CC4E8219AEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cybozu:dezie:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D5B944CC-F0D9-406B-A267-43EBF71C32A6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94831","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/en/jp/JVN16781735/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.cybozu.com/ja-jp/article/9741","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94831","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/en/jp/JVN16781735/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.cybozu.com/ja-jp/article/9741","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}