Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470", "name": "http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470", "tags": [], "refsource": "CONFIRM"}, {"url": "http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff", "name": "http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff", "tags": [], "refsource": "CONFIRM"}, {"url": "https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633", "name": "https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633", "tags": [], "refsource": "CONFIRM"}, {"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162", "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.ubuntu.com/usn/usn-359-1", "name": "USN-359-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.securityfocus.com/bid/20376", "name": "20376", "tags": [], "refsource": "BID"}, {"url": "http://secunia.com/advisories/22276", "name": "22276", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22303", "name": "22303", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "https://issues.rpath.com/browse/RPL-702", "name": "https://issues.rpath.com/browse/RPL-702", "tags": [], "refsource": "CONFIRM"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0713.html", "name": "RHSA-2006:0713", "tags": [], "refsource": "REDHAT"}, {"url": "http://securitytracker.com/id?1017019", "name": "1017019", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/22357", "name": "22357", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22297", "name": "22297", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22358", "name": "22358", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22379", "name": "22379", "tags": [], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-200610-07.xml", "name": "GLSA-200610-07", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/22448", "name": "22448", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2006/dsa-1197", "name": "DSA-1197", "tags": [], "refsource": "DEBIAN"}, {"url": "http://secunia.com/advisories/22512", "name": "22512", "tags": [], "refsource": "SECUNIA"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.debian.org/security/2006/dsa-1198", "name": "DSA-1198", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.novell.com/linux/security/advisories/2006_25_sr.html", "name": "SUSE-SR:2006:025", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/22531", "name": "22531", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/22639", "name": "22639", "tags": [], "refsource": "SECUNIA"}, {"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc", "name": "20061001-01-P", "tags": [], "refsource": "SGI"}, {"url": "http://secunia.com/advisories/22487", "name": "22487", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html", "name": "http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/23680", "name": "23680", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:181", "name": "MDKSA-2006:181", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", "name": "RHSA-2008:0629", "tags": [], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/31492", "name": "31492", "tags": [], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2006/3940", "name": "ADV-2006-3940", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/5131", "name": "ADV-2006-5131", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29408", "name": "python-repr-bo(29408)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789", "name": "oval:org.mitre.oval:def:10789", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded", "name": "20070110 VMware ESX server security updates", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/448244/100/100/threaded", "name": "20061011 rPSA-2006-0187-1 idle python", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-4980", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-10-10T04:06Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_beta_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_final:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_beta_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_beta_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-17T21:40Z"}