Lucene search

K
GnuMailman2.1.3

12 matches found

CVE
CVE
added 2016/09/02 2:59 p.m.167 views

CVE-2016-6893

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.

8.8CVSS7.4AI score0.00444EPSS
CVE
CVE
added 2006/09/06 12:4 a.m.70 views

CVE-2006-3636

Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

6.8CVSS5.5AI score0.2227EPSS
CVE
CVE
added 2010/09/15 8:0 p.m.67 views

CVE-2010-3089

Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.

3.5CVSS4.9AI score0.00393EPSS
CVE
CVE
added 2011/02/22 7:0 p.m.66 views

CVE-2011-0707

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

4.3CVSS7.4AI score0.0246EPSS
CVE
CVE
added 2005/01/19 5:0 a.m.64 views

CVE-2004-1177

Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.

4.3CVSS5.3AI score0.01585EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.63 views

CVE-2005-0202

Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.

5CVSS9.3AI score0.02731EPSS
CVE
CVE
added 2005/11/16 7:42 a.m.59 views

CVE-2005-3573

Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).

5CVSS6.2AI score0.05745EPSS
CVE
CVE
added 2004/08/18 4:0 a.m.56 views

CVE-2004-0412

Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.

5CVSS6.1AI score0.0264EPSS
CVE
CVE
added 2006/09/06 12:4 a.m.52 views

CVE-2006-2941

Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".

5CVSS6.3AI score0.06125EPSS
CVE
CVE
added 2006/03/31 11:6 a.m.51 views

CVE-2006-0052

The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary ...

5CVSS6.2AI score0.06409EPSS
CVE
CVE
added 2011/12/29 11:55 a.m.43 views

CVE-2011-5024

Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote attackers to inject arbitrary web script or HTML via the config parameter.

4.3CVSS5.9AI score0.0038EPSS
CVE
CVE
added 2005/01/19 5:0 a.m.41 views

CVE-2004-1143

The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.

7.5CVSS6.5AI score0.00911EPSS