Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*", "matchCriteriaId": "17631BFA-B2A5-487E-99AB-5B4E25A90B98", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*", "matchCriteriaId": "AC76ADC8-D667-47CD-9039-94385EC33013", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*", "matchCriteriaId": "6E54C8B1-14FB-49A8-B86E-D7F72ED7CBF3", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "2F912F5D-7038-4BD2-AFC3-61073FC1EED0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4CE257B-569C-4A0F-B39D-182962C0B4B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*", "matchCriteriaId": "D59EB083-C0C4-4522-8EF3-D188C026D236", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "13C81A5F-541F-47BF-8ABC-F8C58417DB2D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*", "matchCriteriaId": "1E4B6B96-94ED-460B-BC38-E2C926959BE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*", "matchCriteriaId": "9D2DDFB5-E74A-41C4-A6E6-2DFC7BD744EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*", "matchCriteriaId": "9F20ADB5-9E5F-4728-8FE1-0919174FAA53", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:*", "matchCriteriaId": "E3D97957-11A4-46A9-91DB-D7A03FDF7062", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:*", "matchCriteriaId": "D764BB4E-8FB0-4A54-81F5-2D6BD1C20C81", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "DFD8A1F5-929B-4534-BAF2-192AA81577E6", "versionEndIncluding": "2.1.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "126B8E94-582D-4F6C-A55B-CD1CB03CBD22", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "32B972DB-4288-4033-A303-4B6C2D24949F", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "D38A0D54-9B26-4DF0-855A-BB52AB037578", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F3743A7-E011-4BA1-84BF-226E626B2FF5", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD4123E9-9F50-4119-A83C-4DEDC45E682C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:a1:*:*:*:*:*:*", "matchCriteriaId": "3DDEE288-C16B-4DBB-B682-12718C18F74C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:a2:*:*:*:*:*:*", "matchCriteriaId": "F949ED23-47B3-4904-94FD-68CC793E9532", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b1:*:*:*:*:*:*", "matchCriteriaId": "F430975B-25C6-45BF-B1DA-F1E6AE83CAA2", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b2:*:*:*:*:*:*", "matchCriteriaId": "85902997-C153-4E20-9711-250139D59CDD", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b3:*:*:*:*:*:*", "matchCriteriaId": "28BE5C0E-7F9D-45B6-9A7E-36AE595D8627", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8BD27752-5C26-4DEA-8049-27A20DB83B6A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "204EAE69-4092-462F-976F-A81290687738", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB1DA29-8771-4526-B02F-5352C4F9C0F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C497C3EA-D97E-477B-9D0A-A5E7DFC15341", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "38320742-8595-4F70-BCDD-48FF41F0081B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4D347E7-B8AA-4E23-9B5E-CE8DF73070F2", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in index.php in Hastymail2 2.1.1 before RC2 allows remote attackers to inject arbitrary web script or HTML via the rs parameter in a mailbox Drafts action."}, {"lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en index.php en Hastymail2 antes de la versi\u00f3n v2.1.1 RC2 permite a atacantes remotos inyectar HTML o secuencias de comandos web a trav\u00e9s del par\u00e1metro rs en una acci\u00f3n 'Drafts' en el buz\u00f3n."}], "id": "CVE-2011-4541", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-11-29T00:55:01.060", "references": [{"source": "cve@mitre.org", "url": "http://secunia.com/advisories/48308"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71520"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "https://www.dognaedis.com/vulns/DGS-SEC-2.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48308"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71520"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://www.dognaedis.com/vulns/DGS-SEC-2.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}