Page 8 of 45 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el scritp de creación de CGI en Mailman anteriores a 2.1.3 permite a atacantes remotos robar cookies de otros usuarios. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842 http://mail.python.org/pipermail/mailman-announce/2003-September/000061.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:013 http://www.redhat.com/support/errata/RHSA-2004-020.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A815 https://access.redhat.com/security/cve/CVE-2003-0992 https://bugzilla.redhat.com/show_bug.cgi?id=1617120 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en options.py en Mailman 2.1 y anteriores permite a atacantes remotos inyectar script o HTML en páginas web mediante correo electrónico o parámetros de lenguaje. • https://www.exploit-db.com/exploits/22198 https://www.exploit-db.com/exploits/22199 http://marc.info/?l=bugtraq&m=104342745916111 http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt http://www.debian.org/security/2004/dsa-436 http://www.osvdb.org/9205 http://www.securityfocus.com/bid/6677 http://www.securitytracker.com/id?1005987 https://exchange.xforce.ibmcloud.com/vulnerabilities/11152 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 3

Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature. Vulnerabilidad de secuencias de comandos en sitios cruzados en Mailman 2.0.12 permite a atacantes remotos la ejecución de rutinas como otro usuario mediante las opciones de subscripción de la lista de subscriptores. • https://www.exploit-db.com/exploits/21642 https://www.exploit-db.com/exploits/21641 http://archives.neohapsis.com/archives/bugtraq/2002-07/0268.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000522 http://mail.python.org/pipermail/mailman-announce/2002-July/000043.html http://www.debian.org/security/2002/dsa-147 http://www.iss.net/security_center/static/9985.php http://www.redhat.com/support/errata/RHSA-2002-176.html http://www.redhat.com/support/errata •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Pipermail in Mailman stores private mail messages with predictable filenames in a world-executable directory, which allows local users to read private mailing list archives. It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives. • http://marc.info/?l=bugtraq&m=101902003314968&w=2 http://rhn.redhat.com/errata/RHSA-2015-1417.html http://sourceforge.net/tracker/?func=detail&atid=100103&aid=474616&group_id=103 http://www.iss.net/security_center/static/8874.php http://www.securityfocus.com/bid/4538 https://access.redhat.com/security/cve/CVE-2002-0389 https://bugzilla.redhat.com/show_bug.cgi?id=723584 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries. • https://www.exploit-db.com/exploits/21480 http://mail.python.org/pipermail/mailman-announce/2002-May/000042.html http://www.securityfocus.com/bid/4826 https://access.redhat.com/security/cve/CVE-2002-0388 https://bugzilla.redhat.com/show_bug.cgi?id=1616770 •