{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T09:05:09.307","vulnerabilities":[{"cve":{"id":"CVE-2006-6702","sourceIdentifier":"cve@mitre.org","published":"2006-12-23T01:28:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Global.pm in @Mail before 4.61 allows remote attackers to inject arbitrary web script or HTML via crafted e-mail messages.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Global.pm en @Mail anterior a 4.61 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de mensajes de correo manipulados. NOTA: la procedencia de esta información es desconocida; los detalles han sido obtenidos a partir de la información de terceros. \r\n"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:*:*:*:*:*:*:*:*","versionEndIncluding":"4.6","matchCriteriaId":"58FF2155-3343-40A9-BF3F-4A9E152A9539"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.1:*:*:*:*:*:*:*","matchCriteriaId":"5D90453E-F65F-41BF-AEA3-58AF1A85F809"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.2:*:*:*:*:*:*:*","matchCriteriaId":"880E2DCC-0744-4205-BE5B-28D86285B2AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.3:*:*:*:*:*:*:*","matchCriteriaId":"823ECBB7-974E-4D48-AF3A-96AD2D966AFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.4:*:*:*:*:*:*:*","matchCriteriaId":"902C9E8A-18E4-4D48-B224-787DBF855B3D"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.5:*:*:*:*:*:*:*","matchCriteriaId":"76C43F56-7C89-4D23-8FFA-1911A4A3EB74"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.11:*:*:*:*:*:*:*","matchCriteriaId":"89C9184F-6FBD-4CD9-BBDD-022CE93334BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:atmail:atmail_webmail:4.51:*:*:*:*:*:*:*","matchCriteriaId":"83F78C65-30EE-4A96-8FA0-A280D9EA6B60"}]}]}],"references":[{"url":"http://kb.atmail.com/view_article.php?num=669","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://support.atmail.com/changelog.html","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/5127","source":"cve@mitre.org"},{"url":"http://kb.atmail.com/view_article.php?num=669","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://support.atmail.com/changelog.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/5127","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}