First published: Tue Jan 18 2011(Updated: )
Cross-site scripting (XSS) vulnerability in Hastymail2 before 1.01 allows remote attackers to inject arbitrary web script or HTML via a crafted background attribute within a cell in a TABLE element, related to improper use of the htmLawed filter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hastymail | =beta1 | |
Hastymail | =beta2 | |
Hastymail | =beta3 | |
Hastymail | =rc1 | |
Hastymail | =rc2 | |
Hastymail | =rc3 | |
Hastymail | =rc4 | |
Hastymail | =rc5 | |
Hastymail | =rc6 | |
Hastymail | =rc7 | |
Hastymail | =rc8 | |
Hastymail | =rc9 | |
Hastymail | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4646 is classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2010-4646, upgrade to Hastymail2 version 1.01 or later, which addresses this vulnerability.
CVE-2010-4646 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts or HTML.
CVE-2010-4646 affects Hastymail2 versions beta1, beta2, beta3, and all release candidate versions up to rc9.
Exploiting CVE-2010-4646 may allow attackers to execute malicious scripts in the context of the user's web session.