Lucene search

K
nvd[email protected]NVD:CVE-2011-0707
HistoryFeb 22, 2011 - 7:00 p.m.

CVE-2011-0707

2011-02-2219:00:02
CWE-79
web.nvd.nist.gov
7

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.4

Confidence

High

EPSS

0.003

Percentile

71.1%

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

Affected configurations

Nvd
Node
gnumailmanRange2.1.14
OR
gnumailmanMatch1.0
OR
gnumailmanMatch1.1
OR
gnumailmanMatch2.0
OR
gnumailmanMatch2.0beta3
OR
gnumailmanMatch2.0beta4
OR
gnumailmanMatch2.0beta5
OR
gnumailmanMatch2.0.1
OR
gnumailmanMatch2.0.2
OR
gnumailmanMatch2.0.3
OR
gnumailmanMatch2.0.4
OR
gnumailmanMatch2.0.5
OR
gnumailmanMatch2.0.6
OR
gnumailmanMatch2.0.7
OR
gnumailmanMatch2.0.8
OR
gnumailmanMatch2.0.9
OR
gnumailmanMatch2.0.10
OR
gnumailmanMatch2.0.11
OR
gnumailmanMatch2.0.12
OR
gnumailmanMatch2.0.13
OR
gnumailmanMatch2.0.14
OR
gnumailmanMatch2.1
OR
gnumailmanMatch2.1alpha
OR
gnumailmanMatch2.1beta
OR
gnumailmanMatch2.1stable
OR
gnumailmanMatch2.1.1
OR
gnumailmanMatch2.1.1beta1
OR
gnumailmanMatch2.1.2
OR
gnumailmanMatch2.1.3
OR
gnumailmanMatch2.1.4
OR
gnumailmanMatch2.1.5
OR
gnumailmanMatch2.1.5.8
OR
gnumailmanMatch2.1.6
OR
gnumailmanMatch2.1.7
OR
gnumailmanMatch2.1.8
OR
gnumailmanMatch2.1.9
OR
gnumailmanMatch2.1.10
OR
gnumailmanMatch2.1.11
OR
gnumailmanMatch2.1.11rc1
OR
gnumailmanMatch2.1.11rc2
OR
gnumailmanMatch2.1.12
OR
gnumailmanMatch2.1.13
OR
gnumailmanMatch2.1.13rc1
OR
gnumailmanMatch2.1.14rc1
OR
gnumailmanMatch2.1b1
VendorProductVersionCPE
gnumailman*cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
gnumailman1.0cpe:2.3:a:gnu:mailman:1.0:*:*:*:*:*:*:*
gnumailman1.1cpe:2.3:a:gnu:mailman:1.1:*:*:*:*:*:*:*
gnumailman2.0cpe:2.3:a:gnu:mailman:2.0:*:*:*:*:*:*:*
gnumailman2.0cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*
gnumailman2.0cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*
gnumailman2.0cpe:2.3:a:gnu:mailman:2.0:beta5:*:*:*:*:*:*
gnumailman2.0.1cpe:2.3:a:gnu:mailman:2.0.1:*:*:*:*:*:*:*
gnumailman2.0.2cpe:2.3:a:gnu:mailman:2.0.2:*:*:*:*:*:*:*
gnumailman2.0.3cpe:2.3:a:gnu:mailman:2.0.3:*:*:*:*:*:*:*
Rows per page:
1-10 of 451

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.4

Confidence

High

EPSS

0.003

Percentile

71.1%