Bugs fixes in "mailman"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2021-44227 | In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin passwo | 2021-12-07 |
CVE | CVE-2021-44227 | In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin passwo | 2021-12-07 |
CVE | CVE-2021-43332 | In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could | 2021-11-18 |
CVE | CVE-2021-43331 | In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS. | 2021-11-18 |
CVE | CVE-2021-43332 | In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could | 2021-11-18 |
CVE | CVE-2021-43331 | In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS. | 2021-11-18 |
CVE | CVE-2020-12137 | GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks a | 2021-11-01 |
CVE | CVE-2020-15011 | GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page. | 2021-11-01 |
CVE | CVE-2020-12108 | /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection. | 2021-11-01 |
CVE | CVE-2021-42097 | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain | 2021-11-01 |
CVE | CVE-2021-42096 | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in | 2021-11-01 |
Launchpad | 1947640 | Potential CSRF attack via the user options page. | 2021-11-01 |
Launchpad | 1947639 | Potential Privilege escalation via the user options page. | 2021-11-01 |
CVE | CVE-2020-12137 | GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks a | 2021-11-01 |
CVE | CVE-2020-15011 | GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page. | 2021-11-01 |
CVE | CVE-2020-12108 | /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection. | 2021-11-01 |
CVE | CVE-2021-42097 | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain | 2021-11-01 |
CVE | CVE-2021-42096 | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in | 2021-11-01 |
Launchpad | 1947640 | Potential CSRF attack via the user options page. | 2021-11-01 |
Launchpad | 1947639 | Potential Privilege escalation via the user options page. | 2021-11-01 |
About
-
Send Feedback to @ubuntu_updates