Show plain JSON{"id": "CVE-2004-0978", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2005-02-09T05:00:00.000", "references": [{"url": "http://marc.info/?l=bugtraq&m=110616221411579&w=2", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/673134", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.ngssoftware.com/advisories/heartbeatfull.txt", "tags": ["Broken Link"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/11367", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17714", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=110616221411579&w=2", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/673134", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ngssoftware.com/advisories/heartbeatfull.txt", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/11367", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17714", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4336F0E-75FE-4592-9D98-4F689804956E"}, {"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3F2A51E-2675-4993-B9C2-F2D176A92857"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "530FC172-94E1-481A-9810-26061D22B6AC"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D05ED9D0-CF78-4FAD-9371-6FB3D5825148"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E44D629-D3EB-4F67-BF67-B25910453562"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C69B5E6-D1AF-46F1-8AE6-DD5D4E3D9160"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "E3C43D05-40F8-4769-BA6B-A376420EA972"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:*:*:x64:*", "vulnerable": false, "matchCriteriaId": "B05F3F57-3678-46E2-9963-7B986C2AEFAF"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2572F7E5-75A3-4C11-866B-A4E9ADBD8D08"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "530FC172-94E1-481A-9810-26061D22B6AC"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5"}, {"criteria": "cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2354216-8103-49F9-A95C-7DE4F738BBEE"}, {"criteria": "cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E44D629-D3EB-4F67-BF67-B25910453562"}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:*:*", "vulnerable": false, "matchCriteriaId": "5CEEF2F5-BE40-435C-865B-2D5DDF7C9F5E"}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2572F7E5-75A3-4C11-866B-A4E9ADBD8D08"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}