Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html", "name": "http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/42175", "name": "42175", "tags": ["Third Party Advisory", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://code.google.com/p/chromium/issues/detail?id=58731", "name": "http://code.google.com/p/chromium/issues/detail?id=58731", "tags": ["Exploit", "Issue Tracking", "Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://mail.gnome.org/archives/xml/2010-November/msg00015.html", "name": "[xml] 20101104 Release of libxml2-2.7.8", "tags": ["Mailing List", "Release Notes", "Vendor Advisory"], "refsource": "MLIST"}, {"url": "http://secunia.com/advisories/42109", "name": "42109", "tags": ["Third Party Advisory", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/", "name": "http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/", "tags": ["Broken Link"], "refsource": "MISC"}, {"url": "http://support.apple.com/kb/HT4456", "name": "http://support.apple.com/kb/HT4456", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "name": "APPLE-SA-2010-11-22-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://www.debian.org/security/2010/dsa-2128", "name": "DSA-2128", "tags": ["Third Party Advisory"], "refsource": "DEBIAN"}, {"url": "http://www.securityfocus.com/bid/44779", "name": "44779", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:243", "name": "MDVSA-2010:243", "tags": ["Third Party Advisory"], "refsource": "MANDRIVA"}, {"url": "http://www.vupen.com/english/advisories/2010/3046", "name": "ADV-2010-3046", "tags": ["Permissions Required"], "refsource": "VUPEN"}, {"url": "http://www.ubuntu.com/usn/USN-1016-1", "name": "USN-1016-1", "tags": ["Third Party Advisory"], "refsource": "UBUNTU"}, {"url": "http://secunia.com/advisories/42429", "name": "42429", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2010/3076", "name": "ADV-2010-3076", "tags": ["Permissions Required"], "refsource": "VUPEN"}, {"url": "http://secunia.com/advisories/42314", "name": "42314", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2010/3100", "name": "ADV-2010-3100", "tags": ["Permissions Required"], "refsource": "VUPEN"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "name": "SUSE-SR:2010:023", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "SUSE"}, {"url": "http://www.vupen.com/english/advisories/2011/0230", "name": "ADV-2011-0230", "tags": ["Permissions Required"], "refsource": "VUPEN"}, {"url": "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html", "name": "http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://support.apple.com/kb/HT4554", "name": "http://support.apple.com/kb/HT4554", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html", "name": "APPLE-SA-2011-03-02-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://support.apple.com/kb/HT4566", "name": "http://support.apple.com/kb/HT4566", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html", "name": "APPLE-SA-2011-03-09-2", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://support.apple.com/kb/HT4581", "name": "http://support.apple.com/kb/HT4581", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "name": "APPLE-SA-2011-03-21-1", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "APPLE"}, {"url": "http://marc.info/?l=bugtraq&m=130331363227777&w=2", "name": "SSRT100409", "tags": ["Third Party Advisory"], "refsource": "HP"}, {"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html", "name": "RHSA-2011:1749", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html", "name": "RHSA-2013:0217", "tags": ["Third Party Advisory"], "refsource": "REDHAT"}, {"url": "http://secunia.com/advisories/40775", "name": "40775", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", "name": "HPSBGN02970", "tags": ["Third Party Advisory"], "refsource": "HP"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12148", "name": "oval:org.mitre.oval:def:12148", "tags": ["Third Party Advisory"], "refsource": "OVAL"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2010-4008", "ASSIGNER": "product-security@apple.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2010-11-17T01:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "7.0.517.44"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.2"}, {"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.0.4"}, {"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.2"}, {"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.6.7"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.7.8"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.4.3", "versionStartIncluding": "2.0.0"}, {"cpe23Uri": "cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "3.3.0", "versionStartIncluding": "3.0.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-06-04T20:31Z"}