Page 3 of 29 results (0.024 seconds)

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad Cross-Site Scripting (XSS) en Mailman 2.1.26 y anteriores permite que los atacantes autenticados inyecten scripts web o HTML arbitrarios utilizando vectores no especificados. A cross-site scripting vulnerability (XSS) has been discovered in mailman due to the host_name field not being properly validated. A malicious list owner could use this flaw to create a specially crafted list and inject client-side scripts. • http://jvn.jp/en/jp/JVN00846677/index.html https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.debian.org/security/2018/dsa-4246 https://access.redhat.com/security/cve/CVE-2018-0618 https://bugzilla.redhat.com/show_bug.cgi?id=1596458 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. Se ha descubierto un problema en GNU Mailman en versiones anteriores a la 2.1.28. Una URL manipulada podría provocar que el texto arbitrario se muestre en una página web de un sitio fiable. • https://bugs.launchpad.net/mailman/+bug/1780874 https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.mail-archive.com/mailman-users%40python.org/msg71003.html https://access.redhat.com/security/cve/CVE-2018-13796 https://bugzilla.redhat.com/show_bug.cgi?id=1609090 • CWE-20: Improper Input Validation CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 6.1EPSS: 0%CPEs: 20EXPL: 1

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz de usuario web en Mailman en versiones anteriores a la 2.1.26 permite que atacantes remotos inyecten scripts web o HTML arbitrarios mediante una URL user-options. A cross-site scripting (XSS) flaw was found in mailman. An attacker, able to trick the user into visiting a specific URL, can execute arbitrary web scripts on the user's side and force the victim to perform unintended actions. Mailman versions 1.x up through 2.1.23 suffer from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html http://www.securityfocus.com/bid/104594 https://access.redhat.com/errata/RHSA-2018:0504 https://access.redhat.com/errata/RHSA-2018:0505 https://bugs.launchpad.net/mailman/+bug/1747209 https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html https://usn.ubuntu.com/3563-1 https://www.debian.org/security/2018/dsa-4108 https://www.mail-archive.com/mailman-users%40python.org/msg70375. • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators. Vulnerabilidad de CSRF en la interfaz web administrativa en GNU Mailman en versiones anteriores a 2.1.15 permite a atacantes remotos secuestrar la autenticación de administradores. • http://www.securityfocus.com/bid/92732 http://www.securitytracker.com/id/1037160 https://bugs.launchpad.net/bugs/1614841 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.6EPSS: 2%CPEs: 6EXPL: 1

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name. Vulnerabilidad de salto de directorio en GNU Mailman anterior a 2.1.20, cuando no utiliza un alias estático, permite a atacantes remotos ejecutar ficheros arbitrarios a través de un .. (punto punto) en un nombre de lista. It was found that mailman did not sanitize the list name before passing it to certain MTAs. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.html http://rhn.redhat.com/errata/RHSA-2015-1153.html http://rhn.redhat.com/errata/RHSA-2015-1417.html http://www.debian.org/security/2015/dsa-3214 http://www.securityfocus.com/bid/73922 http://www.securitytracker.com/id/1032033 http://www.ubuntu.com/usn/USN-2558-1 https://bugs.launchpad.net/mailman/+bug/1437145 https:& • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •