Show plain JSON{"id": "CVE-2006-7129", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-03-06T01:19:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/2361", "source": "cve@mitre.org"}, {"url": "http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/30901", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/448763/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20546", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29575", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0298.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/2361", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.matousec.com/info/advisories/BlackICE-Filelock-protection-bypass.php", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/30901", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/448763/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/20546", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29575", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "ISS BlackICE PC Protection 3.6 cpj and cpu, and possibly earlier versions, allows local users to bypass the protection scheme by using the ZwDeleteFile API function to delete the critical filelock.txt file, which stores information about protected files."}, {"lang": "es", "value": "ISS BlackICEPC Protection 3.6 cpj y cpu, y posiblemente versiones anteriores, permite a usuarios locales evitar el esquema de protecci\u00f3n utilizando la funci\u00f3n ZwDeleteFile del API para borrar el archivo cr\u00edtico filelock.txt, el cual almacena informaci\u00f3n sobre archivos protegidos."}], "lastModified": "2024-11-21T00:24:27.663", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:iss:blackice_pc_protection:3.6cpj:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EA7FE32-A0F1-47DD-A306-E0369093083C"}, {"criteria": "cpe:2.3:a:iss:blackice_pc_protection:3.6cpu:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EE7A456-FD11-4506-8015-677CDD8912D1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}