CVE-2006-1712

Cross-site scripting (XSS) vulnerability in the private archive script (private.py) in GNU Mailman 2.1.7 allows remote attackers to inject arbitrary web script or HTML via the action argument.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailman:2.1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=129136 - () http://bugs.gentoo.org/show_bug.cgi?id=129136 -
References () http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html - () http://mail.python.org/pipermail/mailman-announce/2006-April/000084.html -
References () http://secunia.com/advisories/19558 - Patch, Vendor Advisory () http://secunia.com/advisories/19558 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015876 - Patch () http://securitytracker.com/id?1015876 - Patch
References () http://www.mail-archive.com/mailman-checkins%40python.org/msg06273.html - () http://www.mail-archive.com/mailman-checkins%40python.org/msg06273.html -
References () http://www.osvdb.org/24442 - () http://www.osvdb.org/24442 -
References () http://www.securityfocus.com/bid/17403 - Patch () http://www.securityfocus.com/bid/17403 - Patch
References () http://www.vupen.com/english/advisories/2006/1269 - () http://www.vupen.com/english/advisories/2006/1269 -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://www.mail-archive.com/mailman-checkins@python.org/msg06273.html', 'name': 'http://www.mail-archive.com/mailman-checkins@python.org/msg06273.html', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://www.mail-archive.com/mailman-checkins%40python.org/msg06273.html -

Information

Published : 2006-04-11 19:06

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1712

Mitre link : CVE-2006-1712

CVE.ORG link : CVE-2006-1712


JSON object : View

Products Affected

gnu

  • mailman