{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T21:47:07.761","vulnerabilities":[{"cve":{"id":"CVE-2010-3217","sourceIdentifier":"secure@microsoft.com","published":"2010-10-13T19:00:44.697","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka \"Word Pointer Vulnerability.\""},{"lang":"es","value":"Una vulnerabilidad de doble liberación en Word 2002 SP3 de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un documento de Word con registros de invalidación de formato de lista (LFO) especialmente diseñados, también se conoce como \"Word Pointer Vulnerability\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*","matchCriteriaId":"F02894C4-57A7-45FE-B9D2-1A0EE3ABA455"}]}]}],"references":[{"url":"http://secunia.com/secunia_research/2010-76/","source":"secure@microsoft.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/514298/100/0/threaded","source":"secure@microsoft.com"},{"url":"http://www.securityfocus.com/archive/1/515440/100/0/threaded","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA10-285A.html","source":"secure@microsoft.com","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-079","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6695","source":"secure@microsoft.com"},{"url":"http://secunia.com/secunia_research/2010-76/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/514298/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/515440/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.us-cert.gov/cas/techalerts/TA10-285A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-079","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6695","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}