Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu mailman vulnerabilities and exploits
(subscribe to this query)
8.5
CVSSv2
CVE-2021-42097
GNU Mailman prior to 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for ...
Gnu Mailman
Debian Debian Linux 10.0
7.8
CVSSv2
CVE-2005-4153
Mailman 2.1.4 up to and including 2.1.6 allows remote malicious users to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
Gnu Mailman 2.1.6
7.5
CVSSv2
CVE-2006-2191
Format string vulnerability in Mailman prior to 2.1.9 allows malicious users to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.
Gnu Mailman
7.5
CVSSv2
CVE-2004-1143
The password generation in mailman prior to 2.1.5 generates only 5 million unique passwords, which makes it easier for remote malicious users to guess passwords via a brute force attack.
Gnu Mailman 2.0.10
Gnu Mailman 2.0.11
Gnu Mailman 2.0.6
Gnu Mailman 2.0.7
Gnu Mailman 2.1.2
Gnu Mailman 2.1.3
Gnu Mailman 1.0
Gnu Mailman 1.1
Gnu Mailman 2.0.2
Gnu Mailman 2.0.3
Gnu Mailman 2.0
Gnu Mailman 2.0.1
Gnu Mailman 2.0.4
Gnu Mailman 2.0.5
Gnu Mailman 2.1
Gnu Mailman 2.1.1
Gnu Mailman 2.0.12
Gnu Mailman 2.0.13
Gnu Mailman 2.0.8
Gnu Mailman 2.0.9
Gnu Mailman 2.1.4
Gnu Mailman 2.1b1
7.5
CVSSv2
CVE-2002-0855
Cross-site scripting vulnerability in Mailman prior to 2.0.12 allows remote malicious users to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature.
Gnu Mailman 2.0.12
2 EDB exploits
7.5
CVSSv2
CVE-2002-0388
Cross-site scripting vulnerabilities in Mailman prior to 2.0.11 allow remote malicious users to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
Gnu Mailman
1 EDB exploit
7.5
CVSSv2
CVE-2001-1132
Mailman 2.0.x prior to 2.0.6 allows remote malicious users to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication.
Gnu Mailman
7.2
CVSSv2
CVE-2000-0861
Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion.
Gnu Mailman 1.1
6.8
CVSSv2
CVE-2021-44227
In GNU Mailman prior to 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Gnu Mailman
Debian Debian Linux 9.0
6.8
CVSSv2
CVE-2006-3636
Multiple cross-site scripting (XSS) vulnerabilities in Mailman prior to 2.1.9rc1 allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Gnu Mailman 2.1.1
Gnu Mailman 2.1.7
Gnu Mailman 2.1.8
Gnu Mailman 2.1.2
Gnu Mailman 2.1.3
Gnu Mailman 2.1b1
Gnu Mailman 2.1
Gnu Mailman 2.1.5.8
Gnu Mailman 2.1.6
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »