6 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

The which_access variable for Majordomo 2.0 through 1.94.4, and possibly earlier versions, is set to "open" by default, which allows remote attackers to identify the email addresses of members of mailing lists via a "which" command. • http://securityreason.com/securityalert/3235 http://www.securityfocus.com/archive/1/310113 http://www.securityfocus.com/bid/6761 https://exchange.xforce.ibmcloud.com/vulnerabilities/11243 • CWE-16: Configuration •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

Majordomo wrapper allows local users to gain privileges by specifying an alternate configuration file. • https://www.exploit-db.com/exploits/19699 https://www.exploit-db.com/exploits/19700 http://marc.info/?l=bugtraq&m=94780294009285&w=2 http://www.redhat.com/support/errata/RHSA-2000-005.html http://www.securityfocus.com/bid/903 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

resend command in Majordomo allows local users to gain privileges via shell metacharacters. • https://www.exploit-db.com/exploits/19698 http://marc.info/?l=bugtraq&m=94780294009285&w=2 http://www.securityfocus.com/bid/902 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Majordomo 1.94.3 and earlier allows remote attackers to execute arbitrary commands when the advertise or noadvertise directive is used in a configuration file, via shell metacharacters in the Reply-To header. • http://www.securityfocus.com/archive/1/7527 https://exchange.xforce.ibmcloud.com/vulnerabilities/502 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

MajorCool mj_key_cache program allows local users to modify files via a symlink attack. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0957 •