Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://drupal.org/node/113935", "name": "http://drupal.org/node/113935", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/23960", "name": "23960", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.vbdrupal.org/forum/showthread.php?t=786", "name": "http://www.vbdrupal.org/forum/showthread.php?t=786", "tags": ["Broken Link"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/22306", "name": "22306", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/23990", "name": "23990", "tags": ["Third Party Advisory"], "refsource": "SECUNIA"}, {"url": "http://osvdb.org/32136", "name": "32136", "tags": ["Broken Link"], "refsource": "OSVDB"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2007-01/0670.html", "name": "20070129 [DRUPAL-SA-2007-005] Drupal 4.7.6 / 5.1 fixes arbitrary code execution issue", "tags": ["Broken Link"], "refsource": "BUGTRAQ"}, {"url": "http://www.vupen.com/english/advisories/2007/0406", "name": "ADV-2007-0406", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2007/0415", "name": "ADV-2007-0415", "tags": ["Third Party Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31940", "name": "drupal-commentformaddpreview-code-execution(31940)", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The comment_form_add_preview function in comment.module in Drupal before 4.7.6, and 5.x before 5.1, and vbDrupal, allows remote attackers with \"post comments\" privileges and access to multiple input filters to execute arbitrary code by previewing comments, which are not processed by \"normal form validation routines.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2007-0626", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2007-01-31T18:28Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.7.6", "versionStartExcluding": "4.7.0"}, {"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.1", "versionStartIncluding": "5.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-04-19T13:42Z"}