123 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3756",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-22T21:03:00.000",
"lastModified": "2018-10-19T15:39:03.077",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to port scan arbitrary hosts via URLs with modified targets and ports, then comparing the resulting error messages to determine open and closed ports."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DADCA8-2FA0-4170-AB18-6256E2BBFC56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F926EE9D-3C4C-429F-9961-8B31A88494A6"
}
]
}
]
}
],
"references": [
{
"url": "http://metasploit.com/research/vulns/google_proxystylesheet/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/17644",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://securitytracker.com/id?1015246",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/20979",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15509",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/2500",
"source": "cve@mitre.org"
}
]
}