Page 5 of 31 results (0.015 seconds)

CVSS: 5.0EPSS: 12%CPEs: 27EXPL: 0

The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary. • ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892 http://secunia.com/advisories/19522 http://secunia.com/advisories/19545 http://secunia.com/advisories/19571 http://secunia.com/advisories/20624 http://secunia.com/advisories/20782 http://securitytracker.com/id?1015851 http://www.debian.org/security/2006/dsa-1027 http://www.mandriva.com/security/advisories?name=MDKSA-2006:061 http://www.novell.c •

CVSS: 5.0EPSS: 89%CPEs: 24EXPL: 0

Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash). • ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732 http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html http://mail.python.org/pipermail/mailman-users/2005-September/046523.html http://secunia.com/advisories/17511 http://secunia.com/advisories/17874 http://secunia.com/advisories/18456 http://secunia.com/advisories/18503 http://secunia.com/advisories/18612 http://secunia.com/advisories/ •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 0

Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.debian.org/security/2005/dsa-674 http://www.mandriva.com/security/advisories?name=MDKSA-2005:015 http://www.novell.com/linux/security/advisories/2005_07_mailman.html http://www.redhat.com/support/errata/RHSA-2005-235.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18854 https://oval.cisecurity.org/repository/search/ •

CVSS: 7.5EPSS: 1%CPEs: 25EXPL: 0

The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.novell.com/linux/security/advisories/2005_07_mailman.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18857 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field. • ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc http://www.redhat.com/support/errata/RHSA-2004-156.html https://access.redhat.com/security/cve/CVE-2004-0182 https://bugzilla.redhat.com/show_bug.cgi?id=1617173 •