{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T11:32:26.516","vulnerabilities":[{"cve":{"id":"CVE-2012-4668","sourceIdentifier":"cve@mitre.org","published":"2012-08-25T10:29:53.100","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Roundcube Webmail 0.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the signature in an email."},{"lang":"es","value":"Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en Roundcube Webmail v0.8.1 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de la firma en un correo electrónico."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*","versionEndIncluding":"0.8.1","matchCriteriaId":"4A70E3E3-F447-4DE8-B5F5-2FCD8E1A2408"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*","matchCriteriaId":"4C785B00-7F4D-4EBD-A9FA-726D4D35E5D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*","matchCriteriaId":"8F433741-5F73-43B5-A522-C484C64C66A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*","matchCriteriaId":"09DF755B-041E-4A61-BEF6-A613F6F0CE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*","matchCriteriaId":"34D20437-7DE7-4DB8-8C11-37B09A87E3A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*","matchCriteriaId":"55FB4AA3-3528-46B7-BBB9-9185DAA5425C"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*","matchCriteriaId":"066AA2BC-95A8-43E8-A1FE-9F15860691E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*","matchCriteriaId":"82FB886B-35A4-4A8C-AE18-62C845886018"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*","matchCriteriaId":"83FF6973-9BAC-4DF2-BACE-42F0D9340A27"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*","matchCriteriaId":"EB6449FD-C6EE-497C-BE34-88900883AD09"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*","matchCriteriaId":"0CEF8BF6-E09F-4376-B089-9B722A84F591"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*","matchCriteriaId":"946B0B6A-46D3-46B9-BD1E-B03D3339EEB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*","matchCriteriaId":"0D572A44-701A-4D6F-919F-AB8AE4BF4417"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*","matchCriteriaId":"D4D6EA96-EE58-47C3-B545-7238B3F64941"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*","matchCriteriaId":"3584BB62-818D-4A5B-BC7D-EAB0B85614EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*","matchCriteriaId":"332FF744-3682-4818-9602-8F868BF0781E"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*","matchCriteriaId":"2B502047-4DDD-4586-978C-6CEE1C41F923"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*","matchCriteriaId":"43581564-48CF-410C-9CE1-CBAE71153DA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*","matchCriteriaId":"6A5CC548-05E4-4059-8252-FA78ECBB95A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*","matchCriteriaId":"C3FA495A-D7FE-4461-AF57-EB649A1C49B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*","matchCriteriaId":"2D773E61-113A-4EE8-804E-0584B73AB58D"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*","matchCriteriaId":"B276CD07-EB81-4C59-B0E8-83E43EAAB005"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*","matchCriteriaId":"FC0D4825-F78E-40F5-A9CB-45B73DE8FBD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*","matchCriteriaId":"9C8376B9-4DF2-4E23-9C43-EEDE3D800519"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*","matchCriteriaId":"08BC43EB-D26F-48D7-A614-76FAEC07DB82"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*","matchCriteriaId":"1E653FFD-AA00-4F30-B844-85AFA5A5A31B"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*","matchCriteriaId":"BBA46B2E-0FEA-4B17-8E72-381656E07349"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*","matchCriteriaId":"C1DC5945-5C18-40F2-AC79-32FF740A7F61"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.6:*:*:*:*:*:*:*","matchCriteriaId":"B6230C0E-D3A2-4A2E-B6F1-E0695F6E8802"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.7:*:*:*:*:*:*:*","matchCriteriaId":"589AFC14-DC69-4B0B-B22B-74A8B40D63E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.7.1:*:*:*:*:*:*:*","matchCriteriaId":"13A61889-D3B2-46A4-A9A8-60136F8A490B"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.7.2:*:*:*:*:*:*:*","matchCriteriaId":"A1BDB491-F3CF-4C83-ABED-0C615B83D0E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.7.3:*:*:*:*:*:*:*","matchCriteriaId":"DCD7759D-4C21-4EC5-A150-C717B71D5F12"},{"vulnerable":true,"criteria":"cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"04DC85A0-F2AB-4A89-A3B9-853BAB1E0CD4"}]}]}],"references":[{"url":"http://sourceforge.net/news/?group_id=139281&id=309011","source":"cve@mitre.org"},{"url":"http://trac.roundcube.net/ticket/1488613","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/20/2","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/20/9","source":"cve@mitre.org"},{"url":"https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://sourceforge.net/news/?group_id=139281&id=309011","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://trac.roundcube.net/ticket/1488613","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/20/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/20/9","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}