CVE-2011-4541
Published Nov 29, 2011
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in index.php in Hastymail2 2.1.1 before RC2 allows remote attackers to inject arbitrary web script or HTML via the rs parameter in a mailbox Drafts action.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17631BFA-B2A5-487E-99AB-5B4E25A90B98" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC76ADC8-D667-47CD-9039-94385EC33013" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E54C8B1-14FB-49A8-B86E-D7F72ED7CBF3" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F912F5D-7038-4BD2-AFC3-61073FC1EED0" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4CE257B-569C-4A0F-B39D-182962C0B4B1" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D59EB083-C0C4-4522-8EF3-D188C026D236" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13C81A5F-541F-47BF-8ABC-F8C58417DB2D" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E4B6B96-94ED-460B-BC38-E2C926959BE7" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D2DDFB5-E74A-41C4-A6E6-2DFC7BD744EA" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F20ADB5-9E5F-4728-8FE1-0919174FAA53" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3D97957-11A4-46A9-91DB-D7A03FDF7062" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D764BB4E-8FB0-4A54-81F5-2D6BD1C20C81" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFD8A1F5-929B-4534-BAF2-192AA81577E6", "versionEndIncluding": "2.1.1" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "126B8E94-582D-4F6C-A55B-CD1CB03CBD22" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:1.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32B972DB-4288-4033-A303-4B6C2D24949F" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:1.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D38A0D54-9B26-4DF0-855A-BB52AB037578" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:1.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F3743A7-E011-4BA1-84BF-226E626B2FF5" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD4123E9-9F50-4119-A83C-4DEDC45E682C" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:a1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDEE288-C16B-4DBB-B682-12718C18F74C" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:a2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F949ED23-47B3-4904-94FD-68CC793E9532" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F430975B-25C6-45BF-B1DA-F1E6AE83CAA2" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85902997-C153-4E20-9711-250139D59CDD" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:b3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BE5C0E-7F9D-45B6-9A7E-36AE595D8627" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BD27752-5C26-4DEA-8049-27A20DB83B6A" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "204EAE69-4092-462F-976F-A81290687738" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDB1DA29-8771-4526-B02F-5352C4F9C0F5" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C497C3EA-D97E-477B-9D0A-A5E7DFC15341" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38320742-8595-4F70-BCDD-48FF41F0081B" }, { "criteria": "cpe:2.3:a:hastymail:hastymail2:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4D347E7-B8AA-4E23-9B5E-CE8DF73070F2" } ], "operator": "OR" } ] } ]