Saxon XSLT parser in Google Mini Search Appliance allows remote code execution via dangerous Java class methods
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2005-3757 | 22 Nov 200521:00 | – | cvelist |
![]() | Google Appliance ProxyStyleSheet Command Execution | 13 Apr 200914:33 | – | metasploit |
![]() | CVE-2005-3757 | 22 Nov 200521:03 | – | nvd |
![]() | CVE-2005-3757 | 22 Nov 200521:03 | – | cve |
![]() | Google Appliance ProxyStyleSheet Command Execution | 30 Oct 200900:00 | – | packetstorm |
![]() | Google Appliance ProxyStyleSheet - Command Execution (Metasploit) | 1 Jul 201000:00 | – | exploitdb |
![]() | Google Search Appliance proxystylesheet Parameter Multiple Remote Vulnerabilities (XSS, Code Exec, ID) | 22 Nov 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | ooo2dbk | 2.1.0-1.1 | ooo2dbk_2.1.0-1.1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo