First published: Tue Feb 22 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Mailman | =2.1.13 | |
GNU Mailman | =2.1.5 | |
GNU Mailman | =2.1.11-rc1 | |
GNU Mailman | =2.0.5 | |
GNU Mailman | =2.0.1 | |
GNU Mailman | =2.1.5.8 | |
GNU Mailman | =2.1.3 | |
GNU Mailman | =2.0.11 | |
GNU Mailman | =2.0.6 | |
GNU Mailman | =2.0-beta3 | |
GNU Mailman | =2.1.8 | |
GNU Mailman | =2.1.11-rc2 | |
GNU Mailman | =1.1 | |
GNU Mailman | =2.0.14 | |
GNU Mailman | =2.0-beta5 | |
GNU Mailman | =2.0.12 | |
GNU Mailman | =2.1.13-rc1 | |
GNU Mailman | =2.0 | |
GNU Mailman | =2.1.11 | |
GNU Mailman | =2.0-beta4 | |
GNU Mailman | =2.1.2 | |
GNU Mailman | =2.0.9 | |
GNU Mailman | =2.1.9 | |
GNU Mailman | =2.0.3 | |
GNU Mailman | =2.1-stable | |
GNU Mailman | =2.1.14-rc1 | |
GNU Mailman | =2.0.13 | |
GNU Mailman | =2.1.6 | |
GNU Mailman | =2.1-alpha | |
GNU Mailman | =2.0.4 | |
GNU Mailman | =2.1 | |
GNU Mailman | =2.1-beta | |
GNU Mailman | =2.1b1 | |
GNU Mailman | <=2.1.14 | |
GNU Mailman | =2.1.10 | |
GNU Mailman | =2.1.1 | |
GNU Mailman | =2.1.12 | |
GNU Mailman | =1.0 | |
GNU Mailman | =2.0.8 | |
GNU Mailman | =2.1.7 | |
GNU Mailman | =2.1.4 | |
GNU Mailman | =2.0.10 | |
GNU Mailman | =2.1.1-beta1 | |
GNU Mailman | =2.0.2 | |
GNU Mailman | =2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.