{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T22:24:09.028","vulnerabilities":[{"cve":{"id":"CVE-2004-2765","sourceIdentifier":"cve@mitre.org","published":"2010-01-28T20:30:01.043","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, a different vulnerability than CVE-2005-2022 and CVE-2006-5486."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Webmail en Sun ONE Messaging Server v6.1  e iPlanet Messaging Server v5.2 anterior a 5.2hf2.02, cuando se usa Internet Explorer, permite a atacantes inyectar secuencias de comandos web o HTML de su elección a través de un correo electrónico manipulado. Vulnerabilidad distinta de  CVE-2005-2022 y CVE-2006-5486."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:M\/Au:N\/C:N\/I:P\/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:iplanet_messaging_server:5.2:*:*:*:*:*:*:*","matchCriteriaId":"6AB46EE9-8B54-4C14-8850-C7D5B6C62BBE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:sparc:*:*:*:*:*","matchCriteriaId":"C67E67BE-A376-4034-B2DC-DC84E4F2B6E6"},{"vulnerable":false,"criteria":"cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*","matchCriteriaId":"32CF7469-6D2F-4E34-8013-7F0D3433D0B2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:one_messaging_server:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2381FAD3-AF24-4A12-9937-9B63B558F473"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*","matchCriteriaId":"32CF7469-6D2F-4E34-8013-7F0D3433D0B2"},{"vulnerable":false,"criteria":"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*","matchCriteriaId":"A711CDC2-412C-499D-9FA6-7F25B06267C6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:one_messaging_server:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2381FAD3-AF24-4A12-9937-9B63B558F473"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*","matchCriteriaId":"0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:one_messaging_server:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2381FAD3-AF24-4A12-9937-9B63B558F473"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"A423B773-6B8B-4BA3-80A1-C8CAEF4D9BBE"}]}]}],"references":[{"url":"http:\/\/sunsolve.sun.com\/search\/document.do?assetkey=1-21-116568-56-1","source":"cve@mitre.org","tags":["Patch"]},{"url":"http:\/\/sunsolve.sun.com\/search\/document.do?assetkey=1-66-201601-1","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http:\/\/sunsolve.sun.com\/search\/document.do?assetkey=1-21-116568-56-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http:\/\/sunsolve.sun.com\/search\/document.do?assetkey=1-66-201601-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}