Page 3 of 44 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad Cross-Site Scripting (XSS) en Mailman 2.1.26 y anteriores permite que los atacantes autenticados inyecten scripts web o HTML arbitrarios utilizando vectores no especificados. A cross-site scripting vulnerability (XSS) has been discovered in mailman due to the host_name field not being properly validated. A malicious list owner could use this flaw to create a specially crafted list and inject client-side scripts. • http://jvn.jp/en/jp/JVN00846677/index.html https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.debian.org/security/2018/dsa-4246 https://access.redhat.com/security/cve/CVE-2018-0618 https://bugzilla.redhat.com/show_bug.cgi?id=1596458 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. Se ha descubierto un problema en GNU Mailman en versiones anteriores a la 2.1.28. Una URL manipulada podría provocar que el texto arbitrario se muestre en una página web de un sitio fiable. • https://bugs.launchpad.net/mailman/+bug/1780874 https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.mail-archive.com/mailman-users%40python.org/msg71003.html https://access.redhat.com/security/cve/CVE-2018-13796 https://bugzilla.redhat.com/show_bug.cgi?id=1609090 • CWE-20: Improper Input Validation CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 6.1EPSS: 0%CPEs: 20EXPL: 1

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz de usuario web en Mailman en versiones anteriores a la 2.1.26 permite que atacantes remotos inyecten scripts web o HTML arbitrarios mediante una URL user-options. A cross-site scripting (XSS) flaw was found in mailman. An attacker, able to trick the user into visiting a specific URL, can execute arbitrary web scripts on the user's side and force the victim to perform unintended actions. Mailman versions 1.x up through 2.1.23 suffer from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html http://www.securityfocus.com/bid/104594 https://access.redhat.com/errata/RHSA-2018:0504 https://access.redhat.com/errata/RHSA-2018:0505 https://bugs.launchpad.net/mailman/+bug/1747209 https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html https://usn.ubuntu.com/3563-1 https://www.debian.org/security/2018/dsa-4108 https://www.mail-archive.com/mailman-users%40python.org/msg70375. • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators. Vulnerabilidad de CSRF en la interfaz web administrativa en GNU Mailman en versiones anteriores a 2.1.15 permite a atacantes remotos secuestrar la autenticación de administradores. • http://www.securityfocus.com/bid/92732 http://www.securitytracker.com/id/1037160 https://bugs.launchpad.net/bugs/1614841 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 46EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account. Vulnerabilidad de CSRF en la página de opciones de usuario en GNU Mailman 2.1.x en versiones anteriores a 2.1.23 permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios para peticiones que modifican una opción, tal como se demuestra ganando acceso a las credenciales de una cuenta de una víctima. • http://www.debian.org/security/2016/dsa-3668 http://www.securityfocus.com/bid/92731 http://www.securitytracker.com/id/1036728 https://bugs.launchpad.net/bugs/1614841 https://access.redhat.com/security/cve/CVE-2016-6893 https://bugzilla.redhat.com/show_bug.cgi?id=1370155 • CWE-352: Cross-Site Request Forgery (CSRF) •