Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=541698", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=541698", "tags": ["Issue Tracking", "Patch"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/40365", "name": "40365", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://bugs.python.org/issue8678", "name": "http://bugs.python.org/issue8678", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://support.apple.com/kb/HT4435", "name": "http://support.apple.com/kb/HT4435", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "name": "APPLE-SA-2010-11-10-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:215", "name": "MDVSA-2010:215", "tags": ["Broken Link"], "refsource": "MANDRIVA"}, {"url": "http://secunia.com/advisories/42888", "name": "42888", "tags": ["Broken Link"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2011-0027.html", "name": "RHSA-2011:0027", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://www.vupen.com/english/advisories/2011/0122", "name": "ADV-2011-0122", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2011/0212", "name": "ADV-2011-0212", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "name": "SUSE-SR:2011:002", "tags": ["Third Party Advisory"], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/43068", "name": "43068", "tags": ["Broken Link"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2011-0260.html", "name": "RHSA-2011:0260", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://www.vupen.com/english/advisories/2011/0413", "name": "ADV-2011-0413", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/43364", "name": "43364", "tags": ["Broken Link"], "refsource": "SECUNIA"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-120"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2010-1450", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2010-05-27T19:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-02-18T19:41Z"}