CVE-2010-4646
Published Jan 18, 2011
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in Hastymail2 before 1.01 allows remote attackers to inject arbitrary web script or HTML via a crafted background attribute within a cell in a TABLE element, related to improper use of the htmLawed filter.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17631BFA-B2A5-487E-99AB-5B4E25A90B98" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC76ADC8-D667-47CD-9039-94385EC33013" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E54C8B1-14FB-49A8-B86E-D7F72ED7CBF3" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F912F5D-7038-4BD2-AFC3-61073FC1EED0" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4CE257B-569C-4A0F-B39D-182962C0B4B1" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D59EB083-C0C4-4522-8EF3-D188C026D236" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13C81A5F-541F-47BF-8ABC-F8C58417DB2D" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E4B6B96-94ED-460B-BC38-E2C926959BE7" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D2DDFB5-E74A-41C4-A6E6-2DFC7BD744EA" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F20ADB5-9E5F-4728-8FE1-0919174FAA53" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3D97957-11A4-46A9-91DB-D7A03FDF7062" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D764BB4E-8FB0-4A54-81F5-2D6BD1C20C81" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBE8F18C-40C1-4BA5-891B-378A2064E9CC", "versionEndIncluding": "1.0" } ], "operator": "OR" } ] } ]