{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:41:01.046","vulnerabilities":[{"cve":{"id":"CVE-2007-3198","sourceIdentifier":"cve@mitre.org","published":"2007-06-12T23:30:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in comments.php in Maran PHP Blog (Maran Blog), possibly only versions before 20070610, allows remote attackers to inject arbitrary web script or HTML via the id parameter."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en comments.php en Maran PHP Blog (Maran Blog), posiblemente solo versiones anteriores al 10/06/2007, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro id."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:maran:php_blog:*:*:*:*:*:*:*:*","versionEndIncluding":"2007-04-22","matchCriteriaId":"9F817FE7-60F2-4B14-950D-345E9AD581B7"}]}]}],"references":[{"url":"http://osvdb.org/35374","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/25616","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/2797","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/471046/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/494549/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/24409","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.securityfocus.com/bid/30309","source":"cve@mitre.org"},{"url":"http://www.secvsn.com/content/Advisories/sr-060607-maran.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/2148","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34812","source":"cve@mitre.org"},{"url":"http://osvdb.org/35374","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/25616","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://securityreason.com/securityalert/2797","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/471046/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/494549/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/24409","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"http://www.securityfocus.com/bid/30309","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.secvsn.com/content/Advisories/sr-060607-maran.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2007/2148","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34812","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}