Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.videolan.org/security/sa0802.html", "name": "http://www.videolan.org/security/sa0802.html", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060481.html", "name": "20080227 CORE-2008-0130: VLC media player chunk context validation error", "tags": [], "refsource": "FULLDISC"}, {"url": "http://www.coresecurity.com/?action=item&id=2147", "name": "http://www.coresecurity.com/?action=item&id=2147", "tags": [], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/28007", "name": "28007", "tags": [], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id?1019510", "name": "1019510", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/29122", "name": "29122", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/29153", "name": "29153", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml", "name": "GLSA-200803-13", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/29284", "name": "29284", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2008/dsa-1543", "name": "DSA-1543", "tags": [], "refsource": "DEBIAN"}, {"url": "http://secunia.com/advisories/29766", "name": "29766", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2008/0682", "name": "ADV-2008-0682", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.securityfocus.com/archive/1/488841/100/0/threaded", "name": "20080227 CORE-2008-0130: VLC media player chunk context validation error", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The MP4 demuxer (mp4.c) for VLC media player 0.8.6d and earlier, as used in Miro Player 1.1 and earlier, allows remote attackers to overwrite arbitrary memory and execute arbitrary code via a malformed MP4 file."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-399"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-0984", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2008-02-26T19:44Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:miro:miro_player:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.1"}, {"cpe23Uri": "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "0.8.6d"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-15T22:04Z"}