{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T08:35:19.680","vulnerabilities":[{"cve":{"id":"CVE-2005-3970","sourceIdentifier":"cve@mitre.org","published":"2005-12-03T19:03:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in MXChange before 0.2.0-pre10 PL492 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre3:*:*:*:*:*:*:*","matchCriteriaId":"99C4A103-AA61-4E90-8BA2-62DC5D456BF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre4:*:*:*:*:*:*:*","matchCriteriaId":"26341F1A-E92D-4D3E-B286-B7DC31A94BB0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre5:*:*:*:*:*:*:*","matchCriteriaId":"1836ED31-F4EB-4284-A954-BBDDAAAD9D94"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre6:*:*:*:*:*:*:*","matchCriteriaId":"F2A72A75-E503-4562-BC72-F113BA7A4810"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre7:*:*:*:*:*:*:*","matchCriteriaId":"C6727947-36B8-4CFE-90AA-828081BBA35F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre8:*:*:*:*:*:*:*","matchCriteriaId":"B1A5F059-5349-409E-9624-CBEB9456F19F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre9:*:*:*:*:*:*:*","matchCriteriaId":"26F3D490-0AF9-44D4-8B26-090617B9A767"},{"vulnerable":true,"criteria":"cpe:2.3:a:mxchange:mxchange:0.2.0_pre10:*:*:*:*:*:*:*","matchCriteriaId":"C87EC072-64AF-4AA1-BFE2-8E8D089194C9"}]}]}],"references":[{"url":"http://secunia.com/advisories/17793","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/21338","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/15672","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2005/2683","source":"cve@mitre.org"},{"url":"https://sourceforge.net/project/shownotes.php?release_id=374590&group_id=89906","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/17793","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/21338","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/15672","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2005/2683","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://sourceforge.net/project/shownotes.php?release_id=374590&group_id=89906","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}