121 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3754",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-22T21:03:00.000",
"lastModified": "2018-10-19T15:39:02.293",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to inject arbitrary Javascript, and possibly other web script or HTML, via the proxystylesheet variable, which will be executed in the resulting error message."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DADCA8-2FA0-4170-AB18-6256E2BBFC56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F926EE9D-3C4C-429F-9961-8B31A88494A6"
}
]
}
]
}
],
"references": [
{
"url": "http://metasploit.com/research/vulns/google_proxystylesheet/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/17644",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://securitytracker.com/id?1015246",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/20978",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15509",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/2500",
"source": "cve@mitre.org"
}
]
}