{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T20:59:07.226","vulnerabilities":[{"cve":{"id":"CVE-2012-4597","sourceIdentifier":"cve@mitre.org","published":"2012-08-22T10:42:05.490","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en McAfee Email y Web Security (EWS) v5.5 hasta Patch 6 y v5.6 hasta Patch 3, y McAfee Email Gateway (MEG) v7.0.0 y v7.0.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través vectores relacionados con McAfee Security Appliance Management Console/Dashboard."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*","matchCriteriaId":"C8E57CF1-7D4D-45E9-A74D-51D6C7940F26"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*","matchCriteriaId":"36F5B0E9-0B28-4DAD-91C9-0E722D79AC46"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:email_gateway:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"66A502DA-D35D-4293-ACA9-76AE3E2E2EA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:email_gateway:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"75F793C7-F7C5-4B74-B246-0D539F211031"}]}]}],"references":[{"url":"http://www.securitytracker.com/id?1027444","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77979","source":"cve@mitre.org"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10026","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1027444","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77979","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10026","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}