Show plain JSON{"id": "CVE-2014-4946", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-07-14T14:55:07.590", "references": [{"url": "http://lists.horde.org/archives/announce/2014/001019.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.horde.org/archives/announce/2014/001025.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59770", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/59772", "source": "cve@mitre.org"}, {"url": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES", "source": "cve@mitre.org"}, {"url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", "source": "cve@mitre.org"}, {"url": "http://lists.horde.org/archives/announce/2014/001019.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.horde.org/archives/announce/2014/001025.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/59770", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/59772", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Internet Mail Program (IMP) before 6.1.8, as used in Horde Groupware Webmail Edition before 5.1.5, allow remote attackers to inject arbitrary web script or HTML via (1) unspecified flags or (2) a mailbox name in the dynamic mailbox view."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en Horde Internet Mail Program (IMP) anterior a 6.1.8, utilizado en Horde Groupware Webmail Edition anterior a 5.1.5, permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de (1) indicadores no especificados o (2) un nombre de buz\u00f3n en la visualizaci\u00f3n din\u00e1mica de buzones."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "457A127F-2D18-4FAC-A51F-6B10BBC59C40", "versionEndIncluding": "5.1.4"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.0:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "74C2C13C-0014-4E45-B459-50B7005C828D"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.0:rc1:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "3C63CC65-6B19-4B8D-A4DC-3B0C3055E8A7"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.1:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "A09D1D89-A623-442E-9261-F58031BB517D"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.2:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "6C36F237-9CBF-4E9E-A1DF-ABCB0187E725"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.3:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "9103D5DE-E24A-476F-AEE9-68E3736E1C7E"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.4:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "2F5106E5-050E-443C-9A67-0210AA01FE35"}, {"criteria": "cpe:2.3:a:horde:groupware:5.0.5:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "0ABE42CD-F4E3-4255-985D-6AC712231134"}, {"criteria": "cpe:2.3:a:horde:groupware:5.1.0:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "693E0F58-A378-4A85-94B1-66709A557623"}, {"criteria": "cpe:2.3:a:horde:groupware:5.1.0:rc1:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "FB8CD370-1B28-4E95-A357-C0476458A0F3"}, {"criteria": "cpe:2.3:a:horde:groupware:5.1.1:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "D3203790-5230-4F8F-AE5E-F2D48B0B1767"}, {"criteria": "cpe:2.3:a:horde:groupware:5.1.2:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "36EBEA90-C1D6-4AFE-B04D-F085986F8B92"}, {"criteria": "cpe:2.3:a:horde:groupware:5.1.3:*:*:*:webmail:*:*:*", "vulnerable": true, "matchCriteriaId": "3E2F5341-D61A-4FDB-99DE-4B65B6F333C6"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D59AF1C6-0EA7-48DC-BD3E-5611DF294DFE", "versionEndIncluding": "6.1.7"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DB663F3-317F-4E02-8D6A-15185000BF41"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F86A6088-11EA-414A-96FD-214295554AF6"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "590B012A-3F3F-45AD-ACBC-FEA6FC6EB063"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B30DDA2-DC2B-4FBD-B0AE-9622A5C6FA89"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39293A85-A727-40F1-8C22-6F6FFC850ABD"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "224409A7-9D51-4D7C-B0F1-FA55F2C247FB"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AFE6FAC-13F9-4DF7-809E-02D5A88E1993"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EEAAFA4-6E8F-433F-818E-3A39F794885F"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEB9545C-58ED-4A7D-A740-C7AE458751DF"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CF5F1D9-D61A-4935-81A6-131C814F04F9"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12D4458F-4155-465D-AC29-51C163528D4A"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10E16364-A584-4CD5-A408-B78D738A4772"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A5769FE-7950-487D-B648-6EE2BB3D5777"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "754CB9EA-E5D6-431C-93FD-0536CD5DAC26"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4539C8B-5A8C-4C95-9073-2FA7DE4BD367"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE65FD3-06FB-4D8B-B84A-260907B1C950"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C533F92C-BB57-4BB3-89DB-CD67B9738444"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCFD6FBF-164F-4A0D-A121-4FC365FC0393"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB97A81-2BD4-4830-B13E-ADD56B2E6178"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88DAB3CC-1C43-4CA2-B63A-2FE962B2638A"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C4A3CF-71A4-401B-8DDB-D24202781F49"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8340BBB6-EF39-449D-80F3-BAF6F107D429"}, {"criteria": "cpe:2.3:a:horde:internet_mail_program:6.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1768F80C-0098-44A1-B14D-85865FD0F013"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}