Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://metasploit.com/research/vulns/google_proxystylesheet/", "name": "http://metasploit.com/research/vulns/google_proxystylesheet/", "tags": ["Exploit", "Patch", "Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/15509", "name": "15509", "tags": ["Exploit", "Patch"], "refsource": "BID"}, {"url": "http://www.osvdb.org/20981", "name": "20981", "tags": ["Exploit", "Patch"], "refsource": "OSVDB"}, {"url": "http://securitytracker.com/id?1015246", "name": "1015246", "tags": ["Exploit", "Patch", "Vendor Advisory"], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/17644", "name": "17644", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vupen.com/english/advisories/2005/2500", "name": "ADV-2005-2500", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded", "name": "20051121 Google Search Appliance proxystylesheet Flaws", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2005-3757", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2005-11-22T21:03Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:h:google:mini_search_appliance:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:h:google:search_appliance:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-19T15:39Z"}