{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T15:54:14.329","vulnerabilities":[{"cve":{"id":"CVE-2004-1100","sourceIdentifier":"cve@mitre.org","published":"2005-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to execute arbitrary web script or HTML via the append parameter."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mailpost.exe de MailPost 5.1.1sv y posiblemente versiones anteriores, cuando el modo de depuración está activado, permite a atacantes remotos ejecutar script web o HTML mediante el parámetro append."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tips:mailpost:5.1.1sv:*:*:*:*:*:*:*","matchCriteriaId":"748001EF-B2A9-4E2E-80D9-235310723A93"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/107998","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.procheckup.com/security_info/vuln_pr0410.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/11596","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17953","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/107998","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.procheckup.com/security_info/vuln_pr0410.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/11596","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17953","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Successful exploitation requires that debug mode is enabled."}}]}