CVE-2003-0038
GNU Mailman 2.1 - 'email' Cross-Site Scripting
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en options.py en Mailman 2.1 y anteriores permite a atacantes remotos inyectar script o HTML en páginas web mediante correo electrónico o parámetros de lenguaje.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-01-24 First Exploit
- 2003-01-27 CVE Reserved
- 2003-01-29 CVE Published
- 2023-07-10 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=104342745916111 | Mailing List | |
http://www.osvdb.org/9205 | Vdb Entry | |
http://www.securityfocus.com/bid/6677 | Vdb Entry | |
http://www.securitytracker.com/id?1005987 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11152 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/22198 | 2003-01-24 | |
https://www.exploit-db.com/exploits/22199 | 2003-01-24 |
URL | Date | SRC |
---|---|---|
http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt | 2017-07-11 | |
http://www.debian.org/security/2004/dsa-436 | 2017-07-11 |
URL | Date | SRC |
---|