Page 9 of 44 results (0.010 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Mailman 2.0.x before 2.0.6 allows remote attackers to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000420 http://www.osvdb.org/5455 https://exchange.xforce.ibmcloud.com/vulnerabilities/7091 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Mailman 2.0.1 and earlier allows list administrators to obtain user passwords. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0031.html •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0040.html http://archives.neohapsis.com/archives/freebsd/2000-09/0112.html http://www.securityfocus.com/bid/1667 https://exchange.xforce.ibmcloud.com/vulnerabilities/5493 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0474.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0479.html http://www.redhat.com/support/errata/RHSA-2000-030.html http://www.securityfocus.com/archive/1/73220 http://www.securityfocus.com/bid/1539 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000802105050.A11733%40rak.isternet.sk •