Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.securityfocus.com/bid/11468", "name": "11468", "tags": ["Patch", "Vendor Advisory"], "refsource": "BID"}, {"url": "http://www.debian.org/security/2004/dsa-578", "name": "DSA-578", "tags": ["Patch", "Vendor Advisory"], "refsource": "DEBIAN"}, {"url": "http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt", "name": "http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt", "tags": [], "refsource": "MISC"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml", "name": "GLSA-200410-27", "tags": [], "refsource": "GENTOO"}, {"url": "http://www.osvdb.org/11023", "name": "11023", "tags": [], "refsource": "OSVDB"}, {"url": "http://securitytracker.com/id?1011832", "name": "1011832", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/12908", "name": "12908", "tags": [], "refsource": "SECUNIA"}, {"url": "http://marc.info/?l=bugtraq&m=109834486312407&w=2", "name": "20041019 mpg123 \"getauthfromurl\" buffer overflow", "tags": [], "refsource": "BUGTRAQ"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17574", "name": "mpg123-getauthfromurl-bo(17574)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Buffer overflow in the getauthfromURL function in httpget.c in mpg123 pre0.59s and mpg123 0.59r could allow remote attackers or local users to execute arbitrary code via an mp3 file that contains a long string before the @ (at sign) in a URL."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2004-0982", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2005-02-09T05:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mpg123:mpg123:0.59r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mpg123:mpg123:pre0.59s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-11T01:30Z"}