Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu mailman vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-0202
Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and previous versions allows remote malicious users to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended ...
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
Gnu Mailman 2.1b1
Gnu Mailman 2.1.2
Gnu Mailman 2.1.3
Gnu Mailman 2.1
Gnu Mailman 2.1.1
445
VMScore
CVE-2004-0412
Mailman prior to 2.1.5 allows remote malicious users to obtain user passwords via a crafted email request to the Mailman server.
Gnu Mailman 2.1b1
Gnu Mailman 2.1.1
Gnu Mailman 2.1.2
Gnu Mailman 2.1
Gnu Mailman 2.1.3
Gnu Mailman 2.1.4
454
VMScore
CVE-2001-0884
Cross-site scripting vulnerability in Mailman email archiver prior to 2.08 allows malicious users to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
Gnu Mailman 7.0
Gnu Mailman 5.1
Gnu Mailman 6.0
Gnu Mailman
Gnu Mailman 5.0
694
VMScore
CVE-2005-4153
Mailman 2.1.4 up to and including 2.1.6 allows remote malicious users to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
Gnu Mailman 2.1.6
383
VMScore
CVE-2021-38354
The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows malicious users to inject arbitrary web scripts, in versions up to and including 1.0.6.
Gnu-mailman Integration Project Gnu-mailman Integration
445
VMScore
CVE-2004-0182
Mailman prior to 2.0.13 allows remote malicious users to cause a denial of service (crash) via an email message with an empty subject field.
Gnu Mailman
668
VMScore
CVE-2006-2191
Format string vulnerability in Mailman prior to 2.1.9 allows malicious users to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.
Gnu Mailman
755
VMScore
CVE-2002-0388
Cross-site scripting vulnerabilities in Mailman prior to 2.0.11 allow remote malicious users to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
Gnu Mailman
1 EDB exploit
187
VMScore
CVE-2002-0389
Pipermail in Mailman stores private mail messages with predictable filenames in a world-executable directory, which allows local users to read private mailing list archives.
Gnu Mailman
231
VMScore
CVE-2006-4624
CRLF injection vulnerability in Utils.py in Mailman prior to 2.1.9rc1 allows remote malicious users to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
Gnu Mailman
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »