CVE-2006-0052
https://notcve.org/view.php?id=CVE-2006-0052
The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary. • ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892 http://secunia.com/advisories/19522 http://secunia.com/advisories/19545 http://secunia.com/advisories/19571 http://secunia.com/advisories/20624 http://secunia.com/advisories/20782 http://securitytracker.com/id?1015851 http://www.debian.org/security/2006/dsa-1027 http://www.mandriva.com/security/advisories?name=MDKSA-2006:061 http://www.novell.c •
CVE-2005-3573
https://notcve.org/view.php?id=CVE-2005-3573
Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash). • ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732 http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html http://mail.python.org/pipermail/mailman-users/2005-September/046523.html http://secunia.com/advisories/17511 http://secunia.com/advisories/17874 http://secunia.com/advisories/18456 http://secunia.com/advisories/18503 http://secunia.com/advisories/18612 http://secunia.com/advisories/ •
CVE-2004-1177
https://notcve.org/view.php?id=CVE-2004-1177
Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.debian.org/security/2005/dsa-674 http://www.mandriva.com/security/advisories?name=MDKSA-2005:015 http://www.novell.com/linux/security/advisories/2005_07_mailman.html http://www.redhat.com/support/errata/RHSA-2005-235.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18854 https://oval.cisecurity.org/repository/search/ •
CVE-2004-1143
https://notcve.org/view.php?id=CVE-2004-1143
The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.novell.com/linux/security/advisories/2005_07_mailman.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18857 •
CVE-2004-0182
https://notcve.org/view.php?id=CVE-2004-0182
Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field. • ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc http://www.redhat.com/support/errata/RHSA-2004-156.html https://access.redhat.com/security/cve/CVE-2004-0182 https://bugzilla.redhat.com/show_bug.cgi?id=1617173 •