Page 8 of 42 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en options.py en Mailman 2.1 y anteriores permite a atacantes remotos inyectar script o HTML en páginas web mediante correo electrónico o parámetros de lenguaje. • https://www.exploit-db.com/exploits/22198 https://www.exploit-db.com/exploits/22199 http://marc.info/?l=bugtraq&m=104342745916111 http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt http://www.debian.org/security/2004/dsa-436 http://www.osvdb.org/9205 http://www.securityfocus.com/bid/6677 http://www.securitytracker.com/id?1005987 https://exchange.xforce.ibmcloud.com/vulnerabilities/11152 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 3

Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature. Vulnerabilidad de secuencias de comandos en sitios cruzados en Mailman 2.0.12 permite a atacantes remotos la ejecución de rutinas como otro usuario mediante las opciones de subscripción de la lista de subscriptores. • https://www.exploit-db.com/exploits/21642 https://www.exploit-db.com/exploits/21641 http://archives.neohapsis.com/archives/bugtraq/2002-07/0268.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000522 http://mail.python.org/pipermail/mailman-announce/2002-July/000043.html http://www.debian.org/security/2002/dsa-147 http://www.iss.net/security_center/static/9985.php http://www.redhat.com/support/errata/RHSA-2002-176.html http://www.redhat.com/support/errata •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries. • https://www.exploit-db.com/exploits/21480 http://mail.python.org/pipermail/mailman-announce/2002-May/000042.html http://www.securityfocus.com/bid/4826 https://access.redhat.com/security/cve/CVE-2002-0388 https://bugzilla.redhat.com/show_bug.cgi?id=1616770 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Mailman 2.0.x before 2.0.6 allows remote attackers to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000420 http://www.osvdb.org/5455 https://exchange.xforce.ibmcloud.com/vulnerabilities/7091 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Mailman 2.0.1 and earlier allows list administrators to obtain user passwords. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0031.html •