Логотип exploitDog
bind:CVE-2005-3757
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-3757

Количество 3

Количество 3

nvd логотип

CVE-2005-3757

почти 20 лет назад

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

CVSS2: 7.5
EPSS: Высокий
debian логотип

CVE-2005-3757

почти 20 лет назад

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Go ...

CVSS2: 7.5
EPSS: Высокий
github логотип

GHSA-794r-h374-p262

больше 3 лет назад

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2005-3757

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

CVSS2: 7.5
76%
Высокий
почти 20 лет назад
debian логотип
CVE-2005-3757

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Go ...

CVSS2: 7.5
76%
Высокий
почти 20 лет назад
github логотип
GHSA-794r-h374-p262

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

76%
Высокий
больше 3 лет назад

Уязвимостей на страницу