Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2005-11-21T00:00:00", "descriptions": [{"lang": "en", "value": "Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to port scan arbitrary hosts via URLs with modified targets and ports, then comparing the resulting error messages to determine open and closed ports."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "17644", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/17644"}, {"name": "20979", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/20979"}, {"tags": ["x_refsource_MISC"], "url": "http://metasploit.com/research/vulns/google_proxystylesheet/"}, {"name": "20051121 Google Search Appliance proxystylesheet Flaws", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded"}, {"name": "ADV-2005-2500", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2005/2500"}, {"name": "15509", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/15509"}, {"name": "1015246", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://securitytracker.com/id?1015246"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3756", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to port scan arbitrary hosts via URLs with modified targets and ports, then comparing the resulting error messages to determine open and closed ports."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "17644", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17644"}, {"name": "20979", "refsource": "OSVDB", "url": "http://www.osvdb.org/20979"}, {"name": "http://metasploit.com/research/vulns/google_proxystylesheet/", "refsource": "MISC", "url": "http://metasploit.com/research/vulns/google_proxystylesheet/"}, {"name": "20051121 Google Search Appliance proxystylesheet Flaws", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded"}, {"name": "ADV-2005-2500", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2500"}, {"name": "15509", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15509"}, {"name": "1015246", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015246"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T23:24:36.162Z"}, "title": "CVE Program Container", "references": [{"name": "17644", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/17644"}, {"name": "20979", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/20979"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://metasploit.com/research/vulns/google_proxystylesheet/"}, {"name": "20051121 Google Search Appliance proxystylesheet Flaws", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/417310/30/0/threaded"}, {"name": "ADV-2005-2500", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2005/2500"}, {"name": "15509", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/15509"}, {"name": "1015246", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://securitytracker.com/id?1015246"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3756", "datePublished": "2005-11-22T21:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-07T23:24:36.162Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}