{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T23:02:30.440","vulnerabilities":[{"cve":{"id":"CVE-2005-1819","sourceIdentifier":"cve@mitre.org","published":"2005-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in NikoSoft WebMail before 0.11.0 allows remote attackers to inject arbitrary web script or HTML via unknown vectors."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.1:*:*:*:*:*:*:*","matchCriteriaId":"107C79B1-E7CC-4265-B3C5-CEAF6574584D"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.2:*:*:*:*:*:*:*","matchCriteriaId":"C41F005C-5B02-4847-B537-EE77799DAC64"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.3:*:*:*:*:*:*:*","matchCriteriaId":"163B787F-0D86-4BE4-ADEB-52FDF16C123D"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.4:*:*:*:*:*:*:*","matchCriteriaId":"3E01C335-C4A2-4345-9825-E9035E149B44"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.5:*:*:*:*:*:*:*","matchCriteriaId":"8FACDBFD-A9EE-4DDD-A220-76BC6B8F87AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.7:*:*:*:*:*:*:*","matchCriteriaId":"D2E81238-B591-44C3-A0FF-CFE862C56889"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.7.5:*:*:*:*:*:*:*","matchCriteriaId":"910DF924-0496-4332-A751-80B67D76CF7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.7.6:*:*:*:*:*:*:*","matchCriteriaId":"115DFE65-A9AB-4497-B593-1CD871526A45"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.7.7:*:*:*:*:*:*:*","matchCriteriaId":"C6B6BF89-DBD9-4ADA-B219-A6B6AFEF5CC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.7.9:*:*:*:*:*:*:*","matchCriteriaId":"D1C1D06A-7CB0-4B26-AFD6-A819FCB0F6CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"1A55A938-7719-4FF4-8EA4-54FA505FDE58"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.8.1:*:*:*:*:*:*:*","matchCriteriaId":"E5077854-33A7-4514-9215-CAB3E7BDE0A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.8.2:*:*:*:*:*:*:*","matchCriteriaId":"6EA3F05B-7DB4-44ED-B0E3-0CB4F57DBDB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.8.3:*:*:*:*:*:*:*","matchCriteriaId":"ADC151CF-5D4A-42FA-9530-CFA7C2C50498"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.0:*:*:*:*:*:*:*","matchCriteriaId":"5D3F1C5F-2430-4644-A8FC-33A2C3DCA57C"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.1:*:*:*:*:*:*:*","matchCriteriaId":"D293ED3E-E058-4119-9374-85B39FBB4588"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.2:*:*:*:*:*:*:*","matchCriteriaId":"AE7DC704-FBAC-46DE-9E65-73B0EA15066D"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.3:*:*:*:*:*:*:*","matchCriteriaId":"14E7A326-CC01-43E9-8698-683E7420391F"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.4:*:*:*:*:*:*:*","matchCriteriaId":"8B3333AB-7B3C-42C0-912C-8337F1595912"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.5:*:*:*:*:*:*:*","matchCriteriaId":"B1FD3846-BD21-4E7F-BB9B-59EEB40DAF3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.6:*:*:*:*:*:*:*","matchCriteriaId":"92430242-4261-48F2-B5F5-015BB8D7DE93"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.7:*:*:*:*:*:*:*","matchCriteriaId":"E0658F85-0A98-417B-8353-04C5EAD1E0EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.8:*:*:*:*:*:*:*","matchCriteriaId":"20641F0A-8666-476F-82CB-8097ECD4FEE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.9:*:*:*:*:*:*:*","matchCriteriaId":"1246955C-1480-4215-8824-2B906736D629"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.9.10:*:*:*:*:*:*:*","matchCriteriaId":"5A6709A9-0033-4033-9A1D-C03621C9BC90"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.10.0:*:*:*:*:*:*:*","matchCriteriaId":"93245113-44EC-4F6B-9F3A-DEDBD3B79136"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.10.1:*:*:*:*:*:*:*","matchCriteriaId":"B6113CD8-6BBD-49A4-8B1C-42856FA03C07"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.10.2:*:*:*:*:*:*:*","matchCriteriaId":"3E40CDD7-D3CC-407A-99B4-0D7925C6B025"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.10.3:*:*:*:*:*:*:*","matchCriteriaId":"2D96576B-4157-4D91-A39F-483F7AE4749A"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:0.10.4:*:*:*:*:*:*:*","matchCriteriaId":"509161C8-C1A4-4633-996F-5C2CB839A676"},{"vulnerable":true,"criteria":"cpe:2.3:a:nikosoft:webmail:o.6:*:*:*:*:*:*:*","matchCriteriaId":"D017991B-D0F8-4F33-B64C-1B69129027A4"}]}]}],"references":[{"url":"http://secunia.com/advisories/15518","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.nikosoft.net/nswm/","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/15518","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.nikosoft.net/nswm/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}