{"api_version":"1","generated_at":"2026-05-07T03:16:26+00:00","cve":"CVE-2007-2519","urls":{"html":"https://cve.report/CVE-2007-2519","api":"https://cve.report/api/cve/CVE-2007-2519.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-2519","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-2519"},"summary":{"title":"CVE-2007-2519","description":"Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-05-22 19:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.8","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:110","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:110","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support / Security / Advisories /  / MDKSA-2007:110 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25372","name":"http://secunia.com/advisories/25372","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for php - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/24111","name":"http://www.securityfocus.com/bid/24111","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"PHP PEAR INSTALL-AS Attribute Arbitrary File Overwrite Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://pear.php.net/advisory-20070507.txt","name":"http://pear.php.net/advisory-20070507.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://pear.php.net/news/vulnerability2.php","name":"http://pear.php.net/news/vulnerability2.php","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"PEAR :: Arbitrary File Overwrite Vulnerability in the PEAR Installer","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/42108","name":"http://osvdb.org/42108","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.ubuntu.com/usn/usn-462-1","name":"http://www.ubuntu.com/usn/usn-462-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-462-1: PHP vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/1926","name":"http://www.vupen.com/english/advisories/2007/1926","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34482","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34482","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-2519","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2519","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2b2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2b3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2b4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.2b5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3b2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3b3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3b5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.3b6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0a9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0b2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.0rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.10rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.4.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.0a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.0rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.0rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.0rc3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"2519","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php_group","cpe5":"pear","cpe6":"1.5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2007-2519","organization":"Red Hat","lastmodified":"2007-05-24","contributor":"Mark J Cox","statementText":"Installation of a PEAR package from an untrusted source could allow malicious code to be installed and potentially executed by the root user. This is true regardless of the existence of this particular bug in the PEAR installer, so the bug would not be treated as security-sensitive. As when handling system RPM packages, the root user must always ensure that any packages installed are from a trusted source and have been packaged correctly.","cve_year":"2007","cve_id":"2519","crc32":"19962ecf"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T13:42:33.280Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"USN-462-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-462-1"},{"name":"42108","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/42108"},{"name":"MDKSA-2007:110","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:110"},{"name":"24111","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/24111"},{"name":"ADV-2007-1926","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/1926"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://pear.php.net/advisory-20070507.txt"},{"name":"pear-installer-file-overwrite(34482)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34482"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://pear.php.net/news/vulnerability2.php"},{"name":"25372","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25372"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-05-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-28T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"USN-462-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-462-1"},{"name":"42108","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/42108"},{"name":"MDKSA-2007:110","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:110"},{"name":"24111","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/24111"},{"name":"ADV-2007-1926","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/1926"},{"tags":["x_refsource_CONFIRM"],"url":"http://pear.php.net/advisory-20070507.txt"},{"name":"pear-installer-file-overwrite(34482)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34482"},{"tags":["x_refsource_CONFIRM"],"url":"http://pear.php.net/news/vulnerability2.php"},{"name":"25372","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25372"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-2519","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"USN-462-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-462-1"},{"name":"42108","refsource":"OSVDB","url":"http://osvdb.org/42108"},{"name":"MDKSA-2007:110","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:110"},{"name":"24111","refsource":"BID","url":"http://www.securityfocus.com/bid/24111"},{"name":"ADV-2007-1926","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/1926"},{"name":"http://pear.php.net/advisory-20070507.txt","refsource":"CONFIRM","url":"http://pear.php.net/advisory-20070507.txt"},{"name":"pear-installer-file-overwrite(34482)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34482"},{"name":"http://pear.php.net/news/vulnerability2.php","refsource":"CONFIRM","url":"http://pear.php.net/news/vulnerability2.php"},{"name":"25372","refsource":"SECUNIA","url":"http://secunia.com/advisories/25372"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-2519","datePublished":"2007-05-22T19:00:00.000Z","dateReserved":"2007-05-07T00:00:00.000Z","dateUpdated":"2024-08-07T13:42:33.280Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-05-22 19:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.0:*:*:*:*:*:*:*","matchCriteriaId":"AD16518B-EA90-4989-B59A-9E7C9DF3B877"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"0419A76C-2783-41E6-8B9D-984099F42454"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.1:*:*:*:*:*:*:*","matchCriteriaId":"49ED21D8-425B-4A96-A323-EA19D902571A"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2:*:*:*:*:*:*:*","matchCriteriaId":"60B41712-9EB6-45F9-B5A3-F01113BE8006"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"C2C050D0-D118-4538-B334-BA23ADC21569"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2b1:*:*:*:*:*:*:*","matchCriteriaId":"5ECCACD0-E734-491A-965F-0DF48B4BA253"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2b2:*:*:*:*:*:*:*","matchCriteriaId":"2EB4E3E0-6414-46F9-BBEB-DE93FBFA550D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2b3:*:*:*:*:*:*:*","matchCriteriaId":"28735572-3799-47ED-B8D7-2D7A6562CC8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2b4:*:*:*:*:*:*:*","matchCriteriaId":"666E73A5-B149-468B-A2C7-DF1705477297"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.2b5:*:*:*:*:*:*:*","matchCriteriaId":"FCFA477B-5396-4625-828D-FCBBCA8493FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3:*:*:*:*:*:*:*","matchCriteriaId":"C6C105BB-1F21-44B6-AE8C-7C33E75CF648"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"375954D3-275B-4120-B833-2A83091013C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"DBC5456B-C8D4-41EF-9944-1ACE6D04FB16"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"64AE9C03-E7E5-4155-815A-70C160E97F56"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.4:*:*:*:*:*:*:*","matchCriteriaId":"F3A56EB4-5F2A-4FF9-890A-CA316DE637A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.5:*:*:*:*:*:*:*","matchCriteriaId":"7EB4E0C4-D8F6-4C6D-9574-09DBE3C2D68D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3.6:*:*:*:*:*:*:*","matchCriteriaId":"497E6138-C746-44D9-BE46-5713A3AAFD41"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3b1:*:*:*:*:*:*:*","matchCriteriaId":"2C38F7A3-640C-4383-8707-7D8155CBABAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3b2:*:*:*:*:*:*:*","matchCriteriaId":"5B260EFD-C61A-4DFE-B666-8BE84239A692"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3b3:*:*:*:*:*:*:*","matchCriteriaId":"BA6161A6-E29C-49AF-A4F5-87934C4EEE84"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3b5:*:*:*:*:*:*:*","matchCriteriaId":"FC1724F9-8A5B-4126-BABC-22E8603C571A"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.3b6:*:*:*:*:*:*:*","matchCriteriaId":"6F7D4EDD-5417-42CE-8E30-59499A34BFCB"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"BD19B334-3D0C-4008-A5B5-53FE375B4979"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a1:*:*:*:*:*:*:*","matchCriteriaId":"C9BDB709-3887-454D-B874-AFD5FD620731"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a2:*:*:*:*:*:*:*","matchCriteriaId":"B228EA68-3CEE-4880-B060-B333F68794F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a3:*:*:*:*:*:*:*","matchCriteriaId":"33C10AF9-19B7-4C9F-A489-8C8505D87D49"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a4:*:*:*:*:*:*:*","matchCriteriaId":"87475278-5B8B-4BE2-9167-46734A435B49"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a5:*:*:*:*:*:*:*","matchCriteriaId":"207BBE32-3570-4A02-A743-A3A45C2A28DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a6:*:*:*:*:*:*:*","matchCriteriaId":"13D06662-08E6-46D8-A05B-9118D795F203"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a7:*:*:*:*:*:*:*","matchCriteriaId":"6B6D259D-7AC3-4F4A-A855-64FD8FF7E818"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a8:*:*:*:*:*:*:*","matchCriteriaId":"2C4B6FDA-0165-4268-95BA-915918099733"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a9:*:*:*:*:*:*:*","matchCriteriaId":"B506B9CE-CE74-410D-BEFE-75BDF738872A"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a10:*:*:*:*:*:*:*","matchCriteriaId":"D96FCB3D-AC46-43D7-A2E7-CB6BFED37167"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a11:*:*:*:*:*:*:*","matchCriteriaId":"D65E8898-C249-401A-97D4-B4431EC04B00"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0a12:*:*:*:*:*:*:*","matchCriteriaId":"1299C8A2-FB8D-446E-83AC-C78091D14ACF"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0b1:*:*:*:*:*:*:*","matchCriteriaId":"7BFDED6F-D871-4F81-9ADE-D1B6E5A82E61"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0b2:*:*:*:*:*:*:*","matchCriteriaId":"AF54A7BC-D8EC-4ABC-9552-25BB4D592A93"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0rc1:*:*:*:*:*:*:*","matchCriteriaId":"516F5E30-AB29-4AEA-B069-8FEBAF288F46"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.0rc2:*:*:*:*:*:*:*","matchCriteriaId":"0DBDD00D-0D9C-487B-90A0-D61BAB782C88"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"730B3D7E-43AD-4EA6-A3E7-C0424BA61A64"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"AEFECD3A-4669-4D0C-BC51-AA2B635CB3B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.3:*:*:*:*:*:*:*","matchCriteriaId":"D1DF4DAD-7129-493B-B7EA-ADA33F734DB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.4:*:*:*:*:*:*:*","matchCriteriaId":"13766879-04DA-42A2-B147-31D69430FE19"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.5:*:*:*:*:*:*:*","matchCriteriaId":"F9ADB86D-0655-4289-8644-4DBF76162CA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.6:*:*:*:*:*:*:*","matchCriteriaId":"AA5C847B-FD77-4CB3-BD64-0BDA3EC17A5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.7:*:*:*:*:*:*:*","matchCriteriaId":"7BE65B11-B3F2-4CB1-994B-979EA3885B21"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.8:*:*:*:*:*:*:*","matchCriteriaId":"BBCE5B14-6A83-44EA-971E-0CEDBBE6203B"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.9:*:*:*:*:*:*:*","matchCriteriaId":"3C9A0E25-9DCB-4ABB-8039-D9261A95CA5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.10:*:*:*:*:*:*:*","matchCriteriaId":"84069051-338F-4174-9AEB-C41112B2FFF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.10rc1:*:*:*:*:*:*:*","matchCriteriaId":"3401D8C6-5C42-4F59-AA40-7C5D83551E08"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.4.11:*:*:*:*:*:*:*","matchCriteriaId":"7E52E2FA-3A8E-40EF-B57E-ADE9AA9810F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.0:*:*:*:*:*:*:*","matchCriteriaId":"36CEB135-9EFD-490E-BEBA-F3FA75098463"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.0a1:*:*:*:*:*:*:*","matchCriteriaId":"05F60E95-5D51-4D06-B4D4-777E78F89D9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.0rc1:*:*:*:*:*:*:*","matchCriteriaId":"7BB25D31-BD14-4BAB-8D5C-D297F2C61600"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.0rc2:*:*:*:*:*:*:*","matchCriteriaId":"5AEF216F-0ED7-4999-A3A3-285440374773"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.0rc3:*:*:*:*:*:*:*","matchCriteriaId":"B2FF8942-4C67-4674-8DE4-F4948C8FD61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"03F711A9-EFD7-46A2-B826-19183FBB3FFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.2:*:*:*:*:*:*:*","matchCriteriaId":"E8B3F0C6-386E-44B7-85A8-54CE26874384"},{"vulnerable":true,"criteria":"cpe:2.3:a:php_group:pear:1.5.3:*:*:*:*:*:*:*","matchCriteriaId":"FCDED4C0-5733-4322-844D-A2085AFD6CA6"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"2519","Ordinal":"1","Title":"CVE-2007-2519","CVE":"CVE-2007-2519","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"2519","Ordinal":"1","NoteData":"Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.","Type":"Description","Title":"CVE-2007-2519"},{"CveYear":"2007","CveId":"2519","Ordinal":"2","NoteData":"2007-05-22","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"2519","Ordinal":"3","NoteData":"2017-07-28","Type":"Other","Title":"Modified"}]}}}