CVE-2010-3089

Loading...

General

Score:3.5/10.0
Severity:Low
Category:XSS Injection

Impact Metrics

Confidentiality:None
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:Multiple

Relative vulnerabilities

CVE-2006-7243, CVE-2008-0564, CVE-2010-0405, CVE-2010-1323, CVE-2010-1324, CVE-2010-1452, CVE-2010-2068, CVE-2010-2950, CVE-2010-3069, CVE-2010-3315, CVE-2010-3434, CVE-2010-3436, CVE-2010-3709, CVE-2010-3710, CVE-2010-3801, CVE-2010-3802, CVE-2010-3814, CVE-2010-3855, CVE-2010-3870, CVE-2010-4008, CVE-2010-4009, CVE-2010-4020, CVE-2010-4021, CVE-2010-4150, CVE-2010-4260, CVE-2010-4261, CVE-2010-4409, CVE-2010-4479, CVE-2010-4494, CVE-2011-0170, CVE-2011-0172, CVE-2011-0173, CVE-2011-0174, CVE-2011-0175, CVE-2011-0176, CVE-2011-0177, CVE-2011-0178, CVE-2011-0179, CVE-2011-0180, CVE-2011-0181, CVE-2011-0182, CVE-2011-0183, CVE-2011-0184, CVE-2011-0186, CVE-2011-0187, CVE-2011-0188, CVE-2011-0189, CVE-2011-0190, CVE-2011-0191, CVE-2011-0192, CVE-2011-0193, CVE-2011-0194, CVE-2011-0707, CVE-2011-1417

Published on 15/09/10 - Updated on 21/02/14

Description

Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.

Category: XSS Injection

CWE-79 (Cross-Site Scripting (XSS))
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Security Notices

US National Vulnerability DatabaseCVE-2010-3089
Agence Nationale de la Sécurité des Systèmes d'Information CERTA-2011-AVI-100, CERTA-2011-AVI-162
CentOS CESA-2011:0307
Debian DSA-2170-1
Oracle Linux ELSA-2011-0307, ELSA-2011-0308
Redhat RHSA-2011:0307, RHSA-2011:0308
Renater 2011/VULN246

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
gnumailman

Share this vulnerability with:

Twitter Facebook LinkedIn Mail