Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:proxmox:mail_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DC4E1B5-2BDC-41D1-9BE0-A4CE9834B459", "versionEndIncluding": "3.1-5741", "vulnerable": true}, {"criteria": "cpe:2.3:a:proxmox:mail_gateway:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC141986-DB6C-4952-8CD3-77F4F8FC1726", "vulnerable": true}, {"criteria": "cpe:2.3:a:proxmox:mail_gateway:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F63E8677-DF90-4183-80C4-55A71F2AAD2C", "vulnerable": true}, {"criteria": "cpe:2.3:a:proxmox:mail_gateway:3.1-5670:*:*:*:*:*:*:*", "matchCriteriaId": "393A8DF0-2995-44CE-8C7A-007B197A06DE", "vulnerable": true}, {"criteria": "cpe:2.3:a:proxmox:mail_gateway:3.1-5673:*:*:*:*:*:*:*", "matchCriteriaId": "238D7442-36C9-4733-8DB2-A45A666919D4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Proxmox Mail Gateway before 3.1-5829 allow remote attackers to inject arbitrary web script or HTML via the (1) state parameter to objects/who/index.htm or (2) User email address to quarantine/spam/manage.htm."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en Proxmox Mail Gateway anterior a 3.1-5829 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del (1) par\u00e1metro state hacia objects/who/index.htm o (2) direcci\u00f3n de email de usuario hacia quarantine/spam/manage.htm."}], "id": "CVE-2014-2325", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-03-14T14:55:04.407", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2014/Mar/110"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/66169"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2014/Mar/110"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/66169"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}