Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html", "name": "20050206 state of homograph attacks", "tags": ["Exploit", "Vendor Advisory"], "refsource": "FULLDISC"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html", "name": "20050206 Re: state of homograph attacks", "tags": ["Vendor Advisory"], "refsource": "FULLDISC"}, {"url": "http://www.shmoo.com/idn", "name": "http://www.shmoo.com/idn", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.shmoo.com/idn/homograph.txt", "name": "http://www.shmoo.com/idn/homograph.txt", "tags": [], "refsource": "MISC"}, {"url": "http://www.kde.org/info/security/advisory-20050316-2.txt", "name": "http://www.kde.org/info/security/advisory-20050316-2.txt", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/14162", "name": "14162", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2005-325.html", "name": "RHSA-2005:325", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.securityfocus.com/bid/12461", "name": "12461", "tags": [], "refsource": "BID"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:058", "name": "MDKSA-2005:058", "tags": [], "refsource": "MANDRAKE"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236", "name": "multiple-browsers-idn-spoof(19236)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671", "name": "oval:org.mitre.oval:def:10671", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/427976/100/0/threaded", "name": "FLSA:178606", "tags": [], "refsource": "FEDORA"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2005-0237", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2005-05-02T04:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:31Z"}