Page 6 of 30 results (0.023 seconds)

CVSS: 7.8EPSS: 81%CPEs: 3EXPL: 0

Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573. Mailman 2.1.4 a 2.1.6 permite a atacantes remotos causar una denegación de servicio mediante un mensaje que causa que el servidor "falle con un desbordamiento en datos de fecha incorrectos en un mensaje procesado", una vulnerabilidad diferente de CVE-2005-3572. • ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U http://secunia.com/advisories/18449 http://secunia.com/advisories/18456 http://secunia.com/advisories/18612 http://secunia.com/advisories/19167 http://secunia.com/advisories/19196 http://secunia.com/advisories/19532 http://www.debian.org/security/2006/dsa-955 http://www.osvdb.org/21723 http://www.redhat.com/support/errata/RHSA-2006-0204.html http://www.securityfocus.com/bid/16248 http://www.tru •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences. • http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031562.html http://marc.info/?l=bugtraq&m=110805795122386&w=2 http://secunia.com/advisories/14211 http://securitytracker.com/id?1013145 http://www.debian.org/security/2005/dsa-674 http://www.gentoo.org/security/en/glsa/glsa-200502-11.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:037 http://www.novell.com/linux/security&# •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 0

Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.debian.org/security/2005/dsa-674 http://www.mandriva.com/security/advisories?name=MDKSA-2005:015 http://www.novell.com/linux/security/advisories/2005_07_mailman.html http://www.redhat.com/support/errata/RHSA-2005-235.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18854 https://oval.cisecurity.org/repository/search/ •

CVSS: 7.5EPSS: 1%CPEs: 25EXPL: 0

The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796 http://marc.info/?l=bugtraq&m=110549296126351&w=2 http://secunia.com/advisories/13603 http://www.novell.com/linux/security/advisories/2005_07_mailman.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18857 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server. Mailman anteriores a 2.1.5 permiten a atacantes remotos obtener contraseñas de usuario mediante peticiones de correo electronico especialmente elaboradas. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842 http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html http://marc.info/?l=bugtraq&m=109034869927955&w=2 http://secunia.com/advisories/11701 http://security.gentoo.org/glsa/glsa-200406-04.xml http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:051 http://www.securityfocus.com/bid/10412 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559 https://exchange.xforce.ibmcloud •