Page 3 of 23 results (0.015 seconds)

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad Cross-Site Scripting (XSS) en Mailman 2.1.26 y anteriores permite que los atacantes autenticados inyecten scripts web o HTML arbitrarios utilizando vectores no especificados. A cross-site scripting vulnerability (XSS) has been discovered in mailman due to the host_name field not being properly validated. A malicious list owner could use this flaw to create a specially crafted list and inject client-side scripts. • http://jvn.jp/en/jp/JVN00846677/index.html https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.debian.org/security/2018/dsa-4246 https://access.redhat.com/security/cve/CVE-2018-0618 https://bugzilla.redhat.com/show_bug.cgi?id=1596458 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. Se ha descubierto un problema en GNU Mailman en versiones anteriores a la 2.1.28. Una URL manipulada podría provocar que el texto arbitrario se muestre en una página web de un sitio fiable. • https://bugs.launchpad.net/mailman/+bug/1780874 https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html https://security.gentoo.org/glsa/201904-10 https://usn.ubuntu.com/4348-1 https://www.mail-archive.com/mailman-users%40python.org/msg71003.html https://access.redhat.com/security/cve/CVE-2018-13796 https://bugzilla.redhat.com/show_bug.cgi?id=1609090 • CWE-20: Improper Input Validation CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 6.1EPSS: 0%CPEs: 20EXPL: 1

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz de usuario web en Mailman en versiones anteriores a la 2.1.26 permite que atacantes remotos inyecten scripts web o HTML arbitrarios mediante una URL user-options. A cross-site scripting (XSS) flaw was found in mailman. An attacker, able to trick the user into visiting a specific URL, can execute arbitrary web scripts on the user's side and force the victim to perform unintended actions. Mailman versions 1.x up through 2.1.23 suffer from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html http://www.securityfocus.com/bid/104594 https://access.redhat.com/errata/RHSA-2018:0504 https://access.redhat.com/errata/RHSA-2018:0505 https://bugs.launchpad.net/mailman/+bug/1747209 https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html https://usn.ubuntu.com/3563-1 https://www.debian.org/security/2018/dsa-4108 https://www.mail-archive.com/mailman-users%40python.org/msg70375. • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 46EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account. Vulnerabilidad de CSRF en la página de opciones de usuario en GNU Mailman 2.1.x en versiones anteriores a 2.1.23 permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios para peticiones que modifican una opción, tal como se demuestra ganando acceso a las credenciales de una cuenta de una víctima. • http://www.debian.org/security/2016/dsa-3668 http://www.securityfocus.com/bid/92731 http://www.securitytracker.com/id/1036728 https://bugs.launchpad.net/bugs/1614841 https://access.redhat.com/security/cve/CVE-2016-6893 https://bugzilla.redhat.com/show_bug.cgi?id=1370155 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.6EPSS: 2%CPEs: 6EXPL: 1

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name. Vulnerabilidad de salto de directorio en GNU Mailman anterior a 2.1.20, cuando no utiliza un alias estático, permite a atacantes remotos ejecutar ficheros arbitrarios a través de un .. (punto punto) en un nombre de lista. It was found that mailman did not sanitize the list name before passing it to certain MTAs. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.html http://rhn.redhat.com/errata/RHSA-2015-1153.html http://rhn.redhat.com/errata/RHSA-2015-1417.html http://www.debian.org/security/2015/dsa-3214 http://www.securityfocus.com/bid/73922 http://www.securitytracker.com/id/1032033 http://www.ubuntu.com/usn/USN-2558-1 https://bugs.launchpad.net/mailman/+bug/1437145 https:& • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •