Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu mailman 2.1 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-44227
In GNU Mailman prior to 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
Gnu Mailman
Debian Debian Linux 9.0
8.5
CVSSv2
CVE-2021-42097
GNU Mailman prior to 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for ...
Gnu Mailman
Debian Debian Linux 10.0
4.3
CVSSv2
CVE-2020-12137
GNU Mailman 2.x prior to 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perfor...
Gnu Mailman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.2
Opensuse Backports Sle 15.0
4.3
CVSSv2
CVE-2011-5024
Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote malicious users to inject arbitrary web script or HTML via the config parameter.
Gnu Mailman 2.1.3
Gnu Mailman 2.1.8
Gnu Mailman 2.1.11
Gnu Mailman 2.1.2
Gnu Mailman 2.1.9
Gnu Mailman 2.0.13
Gnu Mailman 2.1.6
Gnu Mailman 2.1
Gnu Mailman 2.1.10
Gnu Mailman 2.1.1
Gnu Mailman 2.1.12
Gnu Mailman 2.1.7
Gnu Mailman 2.1.4
4.3
CVSSv2
CVE-2011-0707
Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and previous versions allow remote malicious users to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
Gnu Mailman 2.1.13
Gnu Mailman 2.1.5
Gnu Mailman 2.1.11
Gnu Mailman 2.0.5
Gnu Mailman 2.0.1
Gnu Mailman 2.1.5.8
Gnu Mailman 2.1.3
Gnu Mailman 2.0.11
Gnu Mailman 2.0.6
Gnu Mailman 2.0
Gnu Mailman 2.1.8
Gnu Mailman 1.1
Gnu Mailman 2.0.14
Gnu Mailman 2.0.12
Gnu Mailman 2.1.2
Gnu Mailman 2.0.9
Gnu Mailman 2.1.9
Gnu Mailman 2.0.3
Gnu Mailman 2.1
Gnu Mailman 2.1.14
Gnu Mailman 2.0.13
Gnu Mailman 2.1.6
3.5
CVSSv2
CVE-2010-3089
Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman prior to 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
Gnu Mailman 2.1.5
Gnu Mailman 2.1.11
Gnu Mailman 2.1.3
Gnu Mailman 2.1.8
Gnu Mailman 2.1.13
Gnu Mailman 2.1.2
Gnu Mailman 2.1.9
Gnu Mailman 2.1
Gnu Mailman 2.1.6
Gnu Mailman
Gnu Mailman 2.1.10
Gnu Mailman 2.1.1
Gnu Mailman 2.1.12
Gnu Mailman 2.1.7
Gnu Mailman 2.1.4
6.8
CVSSv2
CVE-2006-3636
Multiple cross-site scripting (XSS) vulnerabilities in Mailman prior to 2.1.9rc1 allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Gnu Mailman 2.1.1
Gnu Mailman 2.1.7
Gnu Mailman 2.1.8
Gnu Mailman 2.1.2
Gnu Mailman 2.1.3
Gnu Mailman 2.1b1
Gnu Mailman 2.1
Gnu Mailman 2.1.5.8
Gnu Mailman 2.1.6
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
1 EDB exploit
5
CVSSv2
CVE-2006-2941
Mailman prior to 2.1.9rc1 allows remote malicious users to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".
Gnu Mailman 2.1.1
Gnu Mailman 2.1.7
Gnu Mailman 2.1.8
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
Gnu Mailman 2.1.2
Gnu Mailman 2.1.3
Gnu Mailman 2.1b1
Gnu Mailman 2.1
Gnu Mailman 2.1.5.8
Gnu Mailman 2.1.6
5
CVSSv2
CVE-2006-0052
The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and previous versions, when using Python's library email module 2.5, allows remote malicious users to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two...
Gnu Mailman 1.1
Gnu Mailman 2.0
Gnu Mailman 2.0.1
Gnu Mailman 2.0.3
Gnu Mailman 2.0.4
Gnu Mailman 1.0
Gnu Mailman 2.0.14
Gnu Mailman 2.0.2
Gnu Mailman 2.0.9
Gnu Mailman 2.1.4
Gnu Mailman 2.1.5
Gnu Mailman 2.1b1
Gnu Mailman 2.0.10
Gnu Mailman 2.0.11
Gnu Mailman 2.0.5
Gnu Mailman 2.0.6
Gnu Mailman 2.1
Gnu Mailman 2.1.1
Gnu Mailman 2.0.12
Gnu Mailman 2.0.13
Gnu Mailman 2.0.7
Gnu Mailman 2.0.8
5
CVSSv2
CVE-2005-3573
Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote malicious users to cause a denial of service (application crash).
Gnu Mailman 2.0.10
Gnu Mailman 2.0.11
Gnu Mailman 2.0.6
Gnu Mailman 2.0.7
Gnu Mailman 2.1.1
Gnu Mailman 2.1.2
Gnu Mailman 2.0.14
Gnu Mailman 2.0.2
Gnu Mailman 2.0.3
Gnu Mailman 2.0
Gnu Mailman 2.1.5
Gnu Mailman 2.1.5.8
Gnu Mailman 2.0.12
Gnu Mailman 2.0.13
Gnu Mailman 2.0.8
Gnu Mailman 2.0.9
Gnu Mailman 2.1.3
Gnu Mailman 2.1.4
Gnu Mailman 2.0.1
Gnu Mailman 2.0.4
Gnu Mailman 2.0.5
Gnu Mailman 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »