mailman is vulnerable to cross-site scripting (XSS). The vulnerability exists as multiple input sanitization flaws were found in the way Mailman displayed usernames of subscribed users on certain pages. If a user who is subscribed to a mailing list were able to trick a victim into visiting one of those pages, they could perform a cross-site scripting (XSS) attack against the victim.
lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056363.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056387.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056399.html
lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
lists.opensuse.org/opensuse-updates/2011-05/msg00000.html
mail.python.org/pipermail/mailman-announce/2011-February/000157.html
mail.python.org/pipermail/mailman-announce/2011-February/000158.html
osvdb.org/70936
secunia.com/advisories/43294
secunia.com/advisories/43389
secunia.com/advisories/43425
secunia.com/advisories/43549
secunia.com/advisories/43580
secunia.com/advisories/43829
support.apple.com/kb/HT5002
www.debian.org/security/2011/dsa-2170
www.mandriva.com/security/advisories?name=MDVSA-2011:036
www.redhat.com/support/errata/RHSA-2011-0307.html
www.redhat.com/support/errata/RHSA-2011-0308.html
www.securityfocus.com/bid/46464
www.securitytracker.com/id?1025106
www.ubuntu.com/usn/USN-1069-1
www.vupen.com/english/advisories/2011/0435
www.vupen.com/english/advisories/2011/0436
www.vupen.com/english/advisories/2011/0460
www.vupen.com/english/advisories/2011/0487
www.vupen.com/english/advisories/2011/0542
www.vupen.com/english/advisories/2011/0720
access.redhat.com/errata/RHSA-2011:0307
access.redhat.com/errata/RHSA-2011:0308
access.redhat.com/security/cve/CVE-2011-0707
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=677375
exchange.xforce.ibmcloud.com/vulnerabilities/65538