{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T23:22:08.921","vulnerabilities":[{"cve":{"id":"CVE-2012-5570","sourceIdentifier":"secalert@redhat.com","published":"2020-02-08T19:15:10.643","lastModified":"2024-11-21T01:44:54.483","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Basic webmail module 6.x-1.x before 6.x-1.2 for Drupal allows remote authenticated users with the \"access basic_webmail\" permission to read arbitrary users' email addresses."},{"lang":"es","value":"El módulo de correo web Basic versiones  6.x-1.x anteriores a 6.x-1.2 para Drupal, permite a usuarios autenticados remotos con el permiso \"acceso basic_webmail\" leer direcciones arbitrarias de correo electrónico de usuarios."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:basic_webmail_project:basic_webmail:6.x-1.0:*:*:*:*:drupal:*:*","matchCriteriaId":"4FF0F175-7A18-40D2-B0D9-153E7B4D0A21"},{"vulnerable":true,"criteria":"cpe:2.3:a:basic_webmail_project:basic_webmail:6.x-1.1:*:*:*:*:drupal:*:*","matchCriteriaId":"757423E8-0DBE-4A6F-9734-1D1BB5E2E21A"},{"vulnerable":true,"criteria":"cpe:2.3:a:basic_webmail_project:basic_webmail:6.x-1.x:dev:*:*:*:drupal:*:*","matchCriteriaId":"A50D8341-1014-4191-AA2B-E7262CD6575E"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2012/11/20/4","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/27/2","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://drupal.org/node/1808616","source":"secalert@redhat.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.drupal.org/node/1808852","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/20/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/11/27/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://drupal.org/node/1808616","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.drupal.org/node/1808852","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}