Vulnerability Details : CVE-2001-1100
sendmessage.cgi in W3Mail 1.0.2, and possibly other CGI programs, allows remote attackers to execute arbitrary commands via shell metacharacters in any field of the 'Compose Message' page.
Exploit prediction scoring system (EPSS) score for CVE-2001-1100
Probability of exploitation activity in the next 30 days: 1.58%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1100
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1100
-
http://www.securityfocus.com/archive/1/218921
Exploit;Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/3673
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/7230
-
http://www.w3mail.org/ChangeLog
Products affected by CVE-2001-1100
- cpe:2.3:a:spencer_miles:w3mail:1.0.2:*:*:*:*:*:*:*