Executive Summary
| Informations | |||
|---|---|---|---|
| Name | CVE-2021-34337 | First vendor Publication | 2023-04-15 |
| Vendor | Cve | Last vendor Modification | 2025-02-06 |
Security-Database Scoring CVSS v3
| Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N | |||
|---|---|---|---|
| Overall CVSS Score | 6.3 | ||
| Base Score | 6.3 | Environmental Score | 6.3 |
| impact SubScore | 5.2 | Temporal Score | 6.3 |
| Exploitabality Sub Score | 1 | ||
| Attack Vector | Local | Attack Complexity | High |
| Privileges Required | Low | User Interaction | None |
| Scope | Unchanged | Confidentiality Impact | High |
| Integrity Impact | High | Availability Impact | None |
| Calculate full CVSS 3.0 Vectors scores | |||
Security-Database Scoring CVSS v2
| Cvss vector : | |||
|---|---|---|---|
| Cvss Base Score | N/A | Attack Range | N/A |
| Cvss Impact Score | N/A | Attack Complexity | N/A |
| Cvss Expoit Score | N/A | Authentication | N/A |
| Calculate full CVSS 2.0 Vectors scores | |||
Detail
| An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces. |
Original Source
| Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34337 |
CPE : Common Platform Enumeration
Sources (Detail)
| Source | Url |
|---|
Alert History
| Date | Informations |
|---|---|
| 2025-02-06 21:21:13 |
|
| 2024-11-28 13:57:38 |
|
| 2023-04-26 00:27:27 |
|
| 2023-04-17 17:27:18 |
|
| 2023-04-16 00:27:14 |
|





