6.8
CVSSv2

CVE-2006-3636

Published: 06/09/2006 Updated: 18/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Mailman prior to 2.1.9rc1 allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu mailman 2.1.1

gnu mailman 2.1.7

gnu mailman 2.1.8

gnu mailman 2.1.2

gnu mailman 2.1.3

gnu mailman 2.1b1

gnu mailman 2.1

gnu mailman 2.1.5.8

gnu mailman 2.1.6

gnu mailman 2.1.4

gnu mailman 2.1.5

Vendor Advisories

Debian Bug report logs - #599833 CVE-2010-3089 Package: mailman; Maintainer for mailman is Mailman for Debian <pkg-mailman-hackers@listsaliothdebianorg>; Source for mailman is src:mailman (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 11 Oct 2010 17:54:12 UTC Severity: grave Tag ...
Steve Alexander discovered that mailman did not properly handle attachments with special filenames A remote user could exploit that to stop mail delivery until the server administrator manually cleaned these posts (CVE-2006-2941) ...
Several security related problems have been discovered in mailman, the web-based GNU mailing list manager The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-3636 Moritz Naumann discovered several cross-site scripting problems that could allow remote attackers to inject arbitrary web script code ...

Exploits

source: wwwsecurityfocuscom/bid/20021/info Mailman is prone to multiple input-validation vulnerabilities because the application fails to sanitize user-input These issues include multiple cross-site scripting vulnerabilities and a CRLF-injection vulnerability A successful exploit of these issues could allow an attacker to steal cookie ...
Mailman version 218 suffers from cross site scripting and log file injection vulnerabilities ...