4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
5.6 Medium
AI Score
Confidence
High
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
0.006 Low
EPSS
Percentile
78.7%
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
bugs.launchpad.net/mailman/+bug/1877379
lists.debian.org/debian-lts-announce/2020/06/msg00036.html
lists.debian.org/debian-lts-announce/2020/07/msg00007.html
usn.ubuntu.com/4406-1/
www.debian.org/security/2021/dsa-4991
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
5.6 Medium
AI Score
Confidence
High
2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
0.006 Low
EPSS
Percentile
78.7%