Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and previous versions allow remote malicious users to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu mailman 2.1.13 |
||
gnu mailman 2.1.5 |
||
gnu mailman 2.1.11 |
||
gnu mailman 2.0.5 |
||
gnu mailman 2.0.1 |
||
gnu mailman 2.1.5.8 |
||
gnu mailman 2.1.3 |
||
gnu mailman 2.0.11 |
||
gnu mailman 2.0.6 |
||
gnu mailman 2.0 |
||
gnu mailman 2.1.8 |
||
gnu mailman 1.1 |
||
gnu mailman 2.0.14 |
||
gnu mailman 2.0.12 |
||
gnu mailman 2.1.2 |
||
gnu mailman 2.0.9 |
||
gnu mailman 2.1.9 |
||
gnu mailman 2.0.3 |
||
gnu mailman 2.1 |
||
gnu mailman 2.1.14 |
||
gnu mailman 2.0.13 |
||
gnu mailman 2.1.6 |
||
gnu mailman 2.0.4 |
||
gnu mailman 2.1b1 |
||
gnu mailman |
||
gnu mailman 2.1.10 |
||
gnu mailman 2.1.1 |
||
gnu mailman 2.1.12 |
||
gnu mailman 1.0 |
||
gnu mailman 2.0.8 |
||
gnu mailman 2.1.7 |
||
gnu mailman 2.1.4 |
||
gnu mailman 2.0.10 |
||
gnu mailman 2.0.2 |
||
gnu mailman 2.0.7 |