Lucene search

K
GnuMailman

5 matches found

CVE
CVE
added 2021/12/02 3:15 a.m.216 views

CVE-2021-44227

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.

8.8CVSS8.5AI score0.00339EPSS
CVE
CVE
added 2021/10/21 1:15 a.m.211 views

CVE-2021-42097

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

8.5CVSS7.5AI score0.01214EPSS
CVE
CVE
added 2016/09/02 2:59 p.m.167 views

CVE-2016-6893

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.

8.8CVSS7.4AI score0.00444EPSS
CVE
CVE
added 2025/04/20 1:15 a.m.63 views

CVE-2025-43920

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardles...

8.1CVSS7.2AI score0.00303EPSS
CVE
CVE
added 2016/09/02 2:59 p.m.54 views

CVE-2016-7123

Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators.

8.8CVSS8.7AI score0.00223EPSS