{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T18:09:00.562","vulnerabilities":[{"cve":{"id":"CVE-2007-0148","sourceIdentifier":"cve@mitre.org","published":"2007-01-09T18:28:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in OmniGroup OmniWeb 5.5.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via format string specifiers in the Javascript alert function."},{"lang":"es","value":"Vulnerabilidad de formato de cadena en OmniGroup OmniWeb 5.5.1 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) o ejecutar código de su elección a través de formatos específicos de cadena en la función de alerta de Javascript."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:omnigroup:omniweb:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"723170E8-2945-4D6E-AF82-485EF9EC00A9"}]}]}],"references":[{"url":"http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/","source":"cve@mitre.org"},{"url":"http://osvdb.org/31222","source":"cve@mitre.org"},{"url":"http://projects.info-pull.com/moab/MOAB-07-01-2007.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/23624","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt","source":"cve@mitre.org"},{"url":"http://www.omnigroup.com/applications/omniweb/releasenotes/","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/archive/1/456578/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/21911","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2007/0075","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31324","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/3098","source":"cve@mitre.org"},{"url":"http://blog.omnigroup.com/2007/01/07/omniweb-552-now-available-and-more-secure/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/31222","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://projects.info-pull.com/moab/MOAB-07-01-2007.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/23624","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.digitalmunition.com/DMA%5B2007-0107a%5D.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.omnigroup.com/applications/omniweb/releasenotes/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/archive/1/456578/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/21911","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/0075","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31324","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/3098","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}