Vulnerability Name: | CVE-2001-0100 (CCN-5797) | ||||||||
Assigned: | 2000-12-21 | ||||||||
Published: | 2000-12-21 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | bslist.cgi mailing list script allows remote attackers to execute arbitrary commands via shell metacharacters in the email address. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20001221 BS Scripts Vulnerabilities Source: CCN Type: BugTraq Mailing List, Thu Dec 21 2000 - 01:19:31 CST BS Scripts Vulnerabilities Source: MITRE Type: CNA CVE-2001-0100 Source: CCN Type: OSVDB ID: 7161 bslist.cgi Email Address Variable Arbitrary Command Execution Source: MISC Type: Patch http://www.stanback.net/ Source: CCN Type: Brian Stanback Web site Freeware Source: XF Type: UNKNOWN bslist-cgi-execute-commands(5797) Source: XF Type: UNKNOWN bslist-cgi-execute-commands(5797) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |