Back to bug 2027222
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2021-11-29 07:11:52 UTC | Depends On | 2027224, 2027223 | |
| Marian Rehak | 2021-11-29 07:18:05 UTC | Blocks | 2027228 | |
| RaTasha Tillery-Smith | 2021-12-02 19:19:18 UTC | Depends On | 2028176 | |
| Fixed In Version | mailman 2.1.36 | |||
| Doc Text | A flaw was found in mailman, this flaw exists in the Cgi/options.py user options page. A malicious attacker could potentially carry out a Cross-Site Scripting attack by providing a crafted URL as input leading to execution of arbitrary JavaScript code | |||
| Doc Text | A flaw was found in mailman, this flaw exists in the Cgi/options.py user options page. A malicious attacker could potentially carry out a Cross-Site Scripting attack by providing a crafted URL as input leading to execution of arbitrary JavaScript code | A flaw was found in mailman in the Cgi/options.py user options page. This flaw allows a malicious attacker to carry out a Cross-site Scripting attack by providing a crafted URL as input, leading to the execution of arbitrary JavaScript code. The highest threat from this vulnerability is confidentiality and integrity. | ||
| Red Hat Bugzilla | 2023-07-07 08:34:16 UTC | Assignee | security-response-team | nobody |
Back to bug 2027222