Show plain JSON{"id": "CVE-2012-2579", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-06-20T14:55:05.937", "references": [{"url": "http://osvdb.org/84534", "source": "cret@cert.org"}, {"url": "http://secunia.com/advisories/50208", "source": "cret@cert.org"}, {"url": "http://www.exploit-db.com/exploits/20361", "tags": ["Exploit"], "source": "cret@cert.org"}, {"url": "http://www.securityfocus.com/bid/54905", "tags": ["Exploit"], "source": "cret@cert.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77538", "source": "cret@cert.org"}, {"url": "http://osvdb.org/84534", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/50208", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/20361", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/54905", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77538", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the WP SimpleMail plugin 1.0.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) To, (2) From, (3) Date, or (4) Subject field of an email."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en el plugin WP SimpleMail 1.0.6 para WordPress permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del campo (1) Para, (2) De, (3) Fecha o (4) Asunto de un email."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wp_simplemail_project:wp_simplemail:1.0.6:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "EC23F607-A1E3-4831-930D-E28016FE3A33"}], "operator": "OR"}]}], "sourceIdentifier": "cret@cert.org"}