{"api_version":"1","generated_at":"2026-04-22T19:49:13+00:00","cve":"CVE-2008-6707","urls":{"html":"https://cve.report/CVE-2008-6707","api":"https://cve.report/api/cve/CVE-2008-6707.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-6707","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-6707"},"summary":{"title":"CVE-2008-6707","description":"The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an \"unnecessary default application,\" (4) unspecified scripts in the states folder, (5) an unspecified \"default application\" that lists server configuration, and (6) \"full system help.\"","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2009-04-10 22:00:00","updated_at":"2017-08-17 01:29:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"http://osvdb.org/46599","name":"46599","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.voipshield.com/research-details.php?id=91","name":"http://www.voipshield.com/research-details.php?id=91","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface Unrestricted Help Access | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43384","name":"avaya-ses-certificate-info-disclosure(43384)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.voipshield.com/research-details.php?id=88","name":"http://www.voipshield.com/research-details.php?id=88","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface Default Application Execution | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.voipshield.com/research-details.php?id=87","name":"http://www.voipshield.com/research-details.php?id=87","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface Objects Folder Script Execution | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://osvdb.org/46600","name":"46600","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43393","name":"avaya-ses-statesfolder-code-execution(43393)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1943/references","name":"ADV-2008-1943","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43389","name":"avaya-ses-application-unauth-access(43389)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30751","name":"30751","refsource":"SECUNIA","tags":[],"title":"Avaya SIP Enablement Services Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.voipshield.com/research-details.php?id=90","name":"http://www.voipshield.com/research-details.php?id=90","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface Server Configuration Information Application Execution | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/29939","name":"29939","refsource":"BID","tags":[],"title":"Avaya Communication Manager Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"ASA-2008-268","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/46598","name":"46598","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.voipshield.com/research-details.php?id=89","name":"http://www.voipshield.com/research-details.php?id=89","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface States Folder Script Execution | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43394","name":"avaya-ses-application-info-disclosure(43394)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.voipshield.com/research-details.php?id=86","name":"http://www.voipshield.com/research-details.php?id=86","refsource":"MISC","tags":[],"title":"SIP Enablement Service Web Interface Certificate Utility Disclosure | Research | VoIPshield Systems Inc.","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43381","name":"avaya-ses-objectsfolder-code-execution(43381)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43395","name":"avaya-ses-help-information-disclosure(43395)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-6707","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-6707","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.5","cpe7":"sp0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.4","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"communication_manager","cpe6":"3.1.5","cpe7":"sp0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"3.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"6707","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avaya","cpe5":"sip_enablement_services","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-6707","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an \"unnecessary default application,\" (4) unspecified scripts in the states folder, (5) an unspecified \"default application\" that lists server configuration, and (6) \"full system help.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"ADV-2008-1943","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1943/references"},{"name":"30751","refsource":"SECUNIA","url":"http://secunia.com/advisories/30751"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm"},{"name":"http://www.voipshield.com/research-details.php?id=86","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=86"},{"name":"avaya-ses-certificate-info-disclosure(43384)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43384"},{"name":"46598","refsource":"OSVDB","url":"http://osvdb.org/46598"},{"name":"avaya-ses-statesfolder-code-execution(43393)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43393"},{"name":"http://www.voipshield.com/research-details.php?id=88","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=88"},{"name":"http://www.voipshield.com/research-details.php?id=90","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=90"},{"name":"http://www.voipshield.com/research-details.php?id=87","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=87"},{"name":"avaya-ses-objectsfolder-code-execution(43381)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43381"},{"name":"29939","refsource":"BID","url":"http://www.securityfocus.com/bid/29939"},{"name":"46599","refsource":"OSVDB","url":"http://osvdb.org/46599"},{"name":"46600","refsource":"OSVDB","url":"http://osvdb.org/46600"},{"name":"http://www.voipshield.com/research-details.php?id=91","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=91"},{"name":"http://www.voipshield.com/research-details.php?id=89","refsource":"MISC","url":"http://www.voipshield.com/research-details.php?id=89"},{"name":"avaya-ses-application-info-disclosure(43394)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43394"},{"name":"avaya-ses-help-information-disclosure(43395)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43395"},{"name":"avaya-ses-application-unauth-access(43389)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43389"}]}},"nvd":{"publishedDate":"2009-04-10 22:00:00","lastModifiedDate":"2017-08-17 01:29:00","problem_types":["CWE-287"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":6.4},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":4.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:sip_enablement_services:3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:sip_enablement_services:3.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:sip_enablement_services:3.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"6707","Ordinal":"37949","Title":"CVE-2008-6707","CVE":"CVE-2008-6707","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"6707","Ordinal":"1","NoteData":"The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an \"unnecessary default application,\" (4) unspecified scripts in the states folder, (5) an unspecified \"default application\" that lists server configuration, and (6) \"full system help.\"","Type":"Description","Title":null},{"CveYear":"2008","CveId":"6707","Ordinal":"2","NoteData":"2009-04-10","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"6707","Ordinal":"3","NoteData":"2017-08-16","Type":"Other","Title":"Modified"}]}}}