This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sympa First view 2012-05-31
Product Sympa Last view 2020-05-27
Version 6.1.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:sympa:sympa

Activity : Overall

Related : CVE

  Date Alert Description
7.8 2020-05-27 CVE-2020-10936

Sympa before 6.2.56 allows privilege escalation.

7.5 2020-02-24 CVE-2020-9369

Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.

9.8 2018-06-26 CVE-2018-1000550

The Sympa Community Sympa version prior to version 6.2.32 contains a Directory Traversal vulnerability in wwsympa.fcgi template editing function that can result in Possibility to create or modify files on the server filesystem. This attack appear to be exploitable via HTTP GET/POST request. This vulnerability appears to have been fixed in 6.2.32.

5 2015-01-22 CVE-2015-1306

The newsletter posting area in the web interface in Sympa 6.0.x before 6.0.10 and 6.1.x before 6.1.24 allows remote attackers to read arbitrary files via unspecified vectors.

7.5 2012-05-31 CVE-2012-2352

The archive management (arc_manage) page in wwsympa/wwsympa.fcgi.in in Sympa before 6.1.11 does not check permissions, which allows remote attackers to list, read, and delete arbitrary list archives via vectors related to the (1) do_arc_manage, (2) do_arc_download, or (3) do_arc_delete functions.

CWE : Common Weakness Enumeration

%idName
20% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
20% (1) CWE-269 Improper Privilege Management
20% (1) CWE-264 Permissions, Privileges, and Access Controls
20% (1) CWE-200 Information Exposure
20% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

OpenVAS Exploits

id Description
2012-05-31 Name : Debian Security Advisory DSA 2477-1 (sympa)
File : nvt/deb_2477_1.nasl
2012-05-31 Name : FreeBSD Ports: sympa
File : nvt/freebsd_sympa0.nasl

Nessus® Vulnerability Scanner

id Description
2018-09-06 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4285.nasl - Type: ACT_GATHER_INFO
2018-07-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1441.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-148.nasl - Type: ACT_GATHER_INFO
2015-03-19 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-051.nasl - Type: ACT_GATHER_INFO
2015-03-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_451a6c79c92b11e4a835000c292ee6b8.nasl - Type: ACT_GATHER_INFO
2015-01-21 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3134.nasl - Type: ACT_GATHER_INFO
2012-05-22 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2477.nasl - Type: ACT_GATHER_INFO
2012-05-22 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_78c39232a34511e19d81d0df9acfd7e5.nasl - Type: ACT_GATHER_INFO