7.5
CVE-2011-4542
- EPSS 75.45%
- Veröffentlicht 30.11.2011 04:05:58
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hastymail ≫ Hastymail2 Updatebeta1
Hastymail ≫ Hastymail2 Updatebeta2
Hastymail ≫ Hastymail2 Updatebeta3
Hastymail ≫ Hastymail2 Updaterc1
Hastymail ≫ Hastymail2 Updaterc2
Hastymail ≫ Hastymail2 Updaterc3
Hastymail ≫ Hastymail2 Updaterc4
Hastymail ≫ Hastymail2 Updaterc5
Hastymail ≫ Hastymail2 Updaterc6
Hastymail ≫ Hastymail2 Updaterc7
Hastymail ≫ Hastymail2 Updaterc8
Hastymail ≫ Hastymail2 Updaterc9
Hastymail ≫ Hastymail2 Updaterc1 Version <= 2.1.1
Hastymail ≫ Hastymail2 Version1.0
Hastymail ≫ Hastymail2 Version1.01
Hastymail ≫ Hastymail2 Version1.1 Updaterc1
Hastymail ≫ Hastymail2 Version1.1 Updaterc2
Hastymail ≫ Hastymail2 Version2.0
Hastymail ≫ Hastymail2 Version2.0 Updatea1
Hastymail ≫ Hastymail2 Version2.0 Updatea2
Hastymail ≫ Hastymail2 Version2.0 Updateb1
Hastymail ≫ Hastymail2 Version2.0 Updateb2
Hastymail ≫ Hastymail2 Version2.0 Updateb3
Hastymail ≫ Hastymail2 Version2.0 Updaterc1
Hastymail ≫ Hastymail2 Version2.0.1
Hastymail ≫ Hastymail2 Version2.0.2
Hastymail ≫ Hastymail2 Version2.0.3
Hastymail ≫ Hastymail2 Version2.0.4
Hastymail ≫ Hastymail2 Version2.0.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 75.45% | 0.988 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.