Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://code.google.com/p/chromium/issues/detail?id=51835", "name": "http://code.google.com/p/chromium/issues/detail?id=51835", "tags": ["Permissions Required"], "refsource": "CONFIRM"}, {"url": "http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html", "name": "http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://code.google.com/p/chromium/issues/detail?id=50515", "name": "http://code.google.com/p/chromium/issues/detail?id=50515", "tags": ["Permissions Required"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/41856", "name": "41856", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.ubuntu.com/usn/USN-1006-1", "name": "USN-1006-1", "tags": ["Third Party Advisory"], "refsource": "UBUNTU"}, {"url": "http://www.vupen.com/english/advisories/2010/2722", "name": "ADV-2010-2722", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html", "name": "APPLE-SA-2010-11-18-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://support.apple.com/kb/HT4455", "name": "http://support.apple.com/kb/HT4455", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://support.apple.com/kb/HT4456", "name": "http://support.apple.com/kb/HT4456", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "name": "APPLE-SA-2010-11-22-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://www.vupen.com/english/advisories/2010/3046", "name": "ADV-2010-3046", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/42314", "name": "42314", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/bid/44200", "name": "44200", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "name": "SUSE-SR:2011:002", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "SUSE"}, {"url": "http://www.vupen.com/english/advisories/2011/0212", "name": "ADV-2011-0212", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/43068", "name": "43068", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html", "name": "RHSA-2011:0177", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://www.vupen.com/english/advisories/2011/0216", "name": "ADV-2011-0216", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/43086", "name": "43086", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039", "name": "MDVSA-2011:039", "tags": ["Third Party Advisory"], "refsource": "MANDRIVA"}, {"url": "http://www.vupen.com/english/advisories/2011/0552", "name": "ADV-2011-0552", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11909", "name": "oval:org.mitre.oval:def:11909", "tags": ["Third Party Advisory"], "refsource": "OVAL"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple use-after-free vulnerabilities in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper handling of MIME types by plug-ins."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-416"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2010-3116", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "acInsufInfo": true, "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2010-08-24T20:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.0.375.127"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.1.3"}, {"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.0.3", "versionStartIncluding": "5.0"}, {"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.2"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.2.6"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-08-04T19:31Z"}