{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T03:59:14.602","vulnerabilities":[{"cve":{"id":"CVE-2005-3424","sourceIdentifier":"cve@mitre.org","published":"2005-11-01T22:02:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.5 allows remote attackers to inject arbitrary web script or HTML via 404 error pages, a different vulnerability than CVE-2005-3425."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5DA61808-36A9-4A80-B664-0A7B5F6A3052"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.1:*:*:*:*:*:*:*","matchCriteriaId":"36B49901-3341-41CD-A731-553BC379DCA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.2:*:*:*:*:*:*:*","matchCriteriaId":"C9262694-51F5-4B95-830A-272737ECC2BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.3:*:*:*:*:*:*:*","matchCriteriaId":"B492A11B-7E67-45B9-8C6C-2EDAC714DF49"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.4:*:*:*:*:*:*:*","matchCriteriaId":"E11F283A-83C6-420F-8F68-8E3C45998770"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.5:*:*:*:*:*:*:*","matchCriteriaId":"57B68CD0-E227-4C59-9FF6-8A5E39133752"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.5b:*:*:*:*:*:*:*","matchCriteriaId":"D7F23C56-CA91-46E2-828C-453924C71991"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.6:*:*:*:*:*:*:*","matchCriteriaId":"A11DA871-1105-4C94-80F4-5DF94E870DEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.7:*:*:*:*:*:*:*","matchCriteriaId":"A1305B46-A74E-4946-8BED-14C3671140D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.8:*:*:*:*:*:*:*","matchCriteriaId":"818D5BB6-56A8-4A01-BCA8-2FC2F5089A1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.9:*:*:*:*:*:*:*","matchCriteriaId":"D9B30C1E-E26C-4208-96E0-10B46FF4D0D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.9.1:*:*:*:*:*:*:*","matchCriteriaId":"30ED7127-4906-4C95-8180-57E7276FD760"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.9.2:*:*:*:*:*:*:*","matchCriteriaId":"9841DC70-40C0-4BC9-A541-76ED29D17825"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.9.3:*:*:*:*:*:*:*","matchCriteriaId":"0215148C-BC39-43D9-992B-60AF00250234"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnump3d:2.9.4:*:*:*:*:*:*:*","matchCriteriaId":"967F0E62-2613-49B5-8607-BE28491574AF"}]}]}],"references":[{"url":"http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/17351","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.debian.org/security/2005/dsa-877","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.gnu.org/software/gnump3d/ChangeLog","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/2005_28_sr.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/20359","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/15226","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2005/2242","source":"cve@mitre.org"},{"url":"http://lists.gnu.org/archive/html/gnump3d-users/2005-10/msg00013.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/17351","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.debian.org/security/2005/dsa-877","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.gnu.org/software/gnump3d/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/2005_28_sr.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/20359","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/15226","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2005/2242","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}