Show plain JSON{"id": "CVE-2014-1648", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-04-23T11:52:59.587", "references": [{"url": "http://seclists.org/fulldisclosure/2014/Apr/256", "tags": ["Exploit"], "source": "secure@symantec.com"}, {"url": "http://www.securityfocus.com/bid/66966", "source": "secure@symantec.com"}, {"url": "http://www.securitytracker.com/id/1030136", "source": "secure@symantec.com"}, {"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140422_00", "tags": ["Vendor Advisory"], "source": "secure@symantec.com"}, {"url": "http://seclists.org/fulldisclosure/2014/Apr/256", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/66966", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1030136", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140422_00", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in brightmail/setting/compliance/DlpConnectFlow$view.flo in the management console in Symantec Messaging Gateway 10.x before 10.5.2 allows remote attackers to inject arbitrary web script or HTML via the displayTab parameter."}, {"lang": "es", "value": "Vulnerabilidad de XSS en brightmail/setting/compliance/DlpConnectFlow$view.flo en la consola de gesti\u00f3n en Symantec Messaging Gateway 10.x anterior a 10.5.2 permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del par\u00e1metro displayTab."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E594CD1D-9861-4CEE-BA0E-39887A5A7298"}, {"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B113A02-780C-4396-ADBF-5A5222C1D902"}, {"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A0A28F9-E3FB-4A2F-98B3-2494A4330F50"}, {"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F1AF588-A8BE-4115-BC4C-724C208596EF"}, {"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD1D6A93-FF3E-47D4-94D4-4E6BD21D59E7"}, {"criteria": "cpe:2.3:a:symantec:messaging_gateway:10.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10B108AE-424A-4142-AC8D-F8A9E60A200B"}], "operator": "OR"}]}], "sourceIdentifier": "secure@symantec.com"}