Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D2A8C5B-6155-4B40-B8C8-B4944064E3DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D11E08A4-79D6-46FE-880F-66E9778C298E", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "55A3894F-2E3F-49CA-BEE5-759D603F6EAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDDBDC41-7E6F-4C97-95BD-7DEB2D9FE837", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3B52D447-8E56-4E04-9650-38D222DA8D2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1C455353-0401-4975-89BC-C23D32A684F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1D9D9E1-D8B7-4A56-BC2F-90BDC97322B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "59DE856E-98FF-4B49-BD7F-3E326FEB89EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "6ED34889-9F98-46BC-9176-557484272C05", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "B7FBC61D-6A08-4DE8-A5E5-A3FC57E7759D", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E52AEEE6-2364-4CFB-9337-C5CCA54362E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD137160-B80D-4C65-A9A9-CEE12107E3DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E6C2AC8-C21A-4152-AAE6-915ACE65CB5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1956C8F0-EB91-4322-85C1-6BE15AA13703", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A48DEBEB-0C2D-4F6A-AF63-04990D2FD5AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E004FA4-0180-458A-8E8C-8167EF684ED8", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F0A1617-17D1-4C9F-A818-27321FD2FEAE", "vulnerable": true}, {"criteria": "cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D86CDC19-43C3-4ACC-94B4-388BCC8A2203", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unknown vulnerability in Horde IMP 3.2.3 and earlier, before a \"security fix,\" does not properly validate input, which allows remote attackers to execute arbitrary script as other users via script or HTML in an e-mail message, possibly triggering a cross-site scripting (XSS) vulnerability."}, {"lang": "es", "value": "Vulnerabilidad desconocida en Hored-IMP 3.2.3 y anteriores, antes de un \"arreglo de seguridad\" no validan adecuadamente la entrada, lo que permite a atacantes remotos ejecutar script de su elecci\u00f3n como otro usuario mediante script o HTML, posiblemente disparando una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS)."}], "id": "CVE-2004-0584", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2004-08-06T04:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/11805"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.gentoo.org/security/en/glsa/glsa-200406-11.xml"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.horde.org/imp/3.2/"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/10501"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16357"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/11805"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.gentoo.org/security/en/glsa/glsa-200406-11.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.horde.org/imp/3.2/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/10501"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16357"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}