Lucene search

K
GnuMailman

47 matches found

CVE
CVE
added 2020/05/06 3:15 p.m.298 views

CVE-2020-12108

/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.

6.5CVSS6.4AI score0.03544EPSS
CVE
CVE
added 2020/06/24 12:15 p.m.277 views

CVE-2020-15011

GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.

4.3CVSS5.6AI score0.00955EPSS
CVE
CVE
added 2020/04/24 1:15 p.m.271 views

CVE-2020-12137

GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conc...

6.1CVSS6.1AI score0.00587EPSS
CVE
CVE
added 2021/12/02 3:15 a.m.216 views

CVE-2021-44227

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.

8.8CVSS8.5AI score0.00339EPSS
CVE
CVE
added 2021/10/21 1:15 a.m.211 views

CVE-2021-42097

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

8.5CVSS7.5AI score0.01214EPSS
CVE
CVE
added 2018/01/23 4:29 p.m.206 views

CVE-2018-5950

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

6.1CVSS5.9AI score0.02431EPSS
CVE
CVE
added 2021/10/21 1:15 a.m.206 views

CVE-2021-42096

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.

4.3CVSS5.6AI score0.00404EPSS
CVE
CVE
added 2018/07/12 6:29 p.m.174 views

CVE-2018-13796

An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.

6.5CVSS6AI score0.00306EPSS
CVE
CVE
added 2018/07/26 5:29 p.m.170 views

CVE-2018-0618

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.

5.4CVSS5AI score0.00552EPSS
CVE
CVE
added 2016/09/02 2:59 p.m.167 views

CVE-2016-6893

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.

8.8CVSS7.4AI score0.00444EPSS
CVE
CVE
added 2015/04/13 2:59 p.m.93 views

CVE-2015-2775

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

7.6CVSS6.3AI score0.08031EPSS
CVE
CVE
added 2021/11/12 9:15 p.m.90 views

CVE-2021-43331

In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.

6.1CVSS6.5AI score0.00139EPSS
CVE
CVE
added 2021/11/12 9:15 p.m.79 views

CVE-2021-43332

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.

6.5CVSS6.4AI score0.00144EPSS
CVE
CVE
added 2025/04/20 1:15 a.m.72 views

CVE-2025-43919

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable...

7.5CVSS6.6AI score0.00103EPSS
CVE
CVE
added 2006/09/06 12:4 a.m.70 views

CVE-2006-3636

Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

6.8CVSS5.5AI score0.2227EPSS
CVE
CVE
added 2023/04/15 8:16 p.m.68 views

CVE-2021-34337

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers...

6.3CVSS6.3AI score0.00391EPSS
CVE
CVE
added 2010/09/15 8:0 p.m.67 views

CVE-2010-3089

Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.

3.5CVSS4.9AI score0.00393EPSS
CVE
CVE
added 2011/02/22 7:0 p.m.66 views

CVE-2011-0707

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

4.3CVSS7.4AI score0.0246EPSS
CVE
CVE
added 2005/01/19 5:0 a.m.64 views

CVE-2004-1177

Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.

4.3CVSS5.3AI score0.01585EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.63 views

CVE-2005-0202

Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.

5CVSS9.3AI score0.02731EPSS
CVE
CVE
added 2025/04/20 1:15 a.m.63 views

CVE-2025-43920

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardles...

8.1CVSS7.2AI score0.00303EPSS
CVE
CVE
added 2006/09/07 7:4 p.m.62 views

CVE-2006-4624

CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.

2.6CVSS6.6AI score0.02388EPSS
CVE
CVE
added 2005/12/11 2:3 a.m.60 views

CVE-2005-4153

Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.

7.8CVSS6.2AI score0.08698EPSS
CVE
CVE
added 2005/11/16 7:42 a.m.59 views

CVE-2005-3573

Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).

5CVSS6.2AI score0.05745EPSS
CVE
CVE
added 2004/08/18 4:0 a.m.56 views

CVE-2004-0412

Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.

5CVSS6.1AI score0.0264EPSS
CVE
CVE
added 2003/04/02 5:0 a.m.54 views

CVE-2002-0389

Pipermail in Mailman stores private mail messages with predictable filenames in a world-executable directory, which allows local users to read private mailing list archives.

2.1CVSS5.7AI score0.00278EPSS
CVE
CVE
added 2016/09/02 2:59 p.m.54 views

CVE-2016-7123

Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators.

8.8CVSS8.7AI score0.00223EPSS
CVE
CVE
added 2025/04/20 1:15 a.m.53 views

CVE-2025-43921

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.

5.3CVSS5.3AI score0.00065EPSS
CVE
CVE
added 2004/02/17 5:0 a.m.52 views

CVE-2003-0965

Cross-site scripting (XSS) vulnerability in the admin CGI script for Mailman before 2.1.4 allows remote attackers to steal session cookies and conduct unauthorized activities.

6.8CVSS5.5AI score0.03138EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.52 views

CVE-2005-0080

The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.

5CVSS6.6AI score0.00391EPSS
CVE
CVE
added 2006/09/06 12:4 a.m.52 views

CVE-2006-2941

Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".

5CVSS6.3AI score0.06125EPSS
CVE
CVE
added 2006/03/31 11:6 a.m.51 views

CVE-2006-0052

The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary ...

5CVSS6.2AI score0.06409EPSS
CVE
CVE
added 2002/06/25 4:0 a.m.50 views

CVE-2001-1132

Mailman 2.0.x before 2.0.6 allows remote attackers to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication.

7.5CVSS7.2AI score0.00856EPSS
CVE
CVE
added 2000/10/20 4:0 a.m.48 views

CVE-2000-0701

The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.

4.6CVSS7AI score0.00069EPSS
CVE
CVE
added 2004/06/01 4:0 a.m.48 views

CVE-2004-0182

Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.

5CVSS6.6AI score0.0057EPSS
CVE
CVE
added 2006/09/19 9:7 p.m.48 views

CVE-2006-2191

Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.

7.5CVSS7.2AI score0.00537EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.47 views

CVE-2003-0991

Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.

5CVSS6.3AI score0.01583EPSS
CVE
CVE
added 2004/02/17 5:0 a.m.47 views

CVE-2003-0992

Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users.

4.3CVSS5.7AI score0.00524EPSS
CVE
CVE
added 2002/06/25 4:0 a.m.45 views

CVE-2001-0884

Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.

5.1CVSS6.3AI score0.00654EPSS
CVE
CVE
added 2003/02/07 5:0 a.m.45 views

CVE-2003-0038

Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.

4.3CVSS5.4AI score0.10629EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.44 views

CVE-2001-0290

Vulnerability in Mailman 2.0.1 and earlier allows list administrators to obtain user passwords.

4.6CVSS6.8AI score0.00069EPSS
CVE
CVE
added 2002/09/05 4:0 a.m.43 views

CVE-2002-0855

Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature.

7.5CVSS6.5AI score0.19992EPSS
CVE
CVE
added 2011/12/29 11:55 a.m.43 views

CVE-2011-5024

Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote attackers to inject arbitrary web script or HTML via the config parameter.

4.3CVSS5.9AI score0.0038EPSS
CVE
CVE
added 2006/04/11 7:6 p.m.42 views

CVE-2006-1712

Cross-site scripting (XSS) vulnerability in the private archive script (private.py) in GNU Mailman 2.1.7 allows remote attackers to inject arbitrary web script or HTML via the action argument.

2.6CVSS5.5AI score0.00558EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.41 views

CVE-2000-0861

Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion.

7.2CVSS7.8AI score0.00049EPSS
CVE
CVE
added 2005/01/19 5:0 a.m.41 views

CVE-2004-1143

The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.

7.5CVSS6.5AI score0.00911EPSS
CVE
CVE
added 2002/06/18 4:0 a.m.38 views

CVE-2002-0388

Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.

7.5CVSS6.5AI score0.03149EPSS