mailman vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mailman package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2
  • M
Insufficient Verification of Data Authenticity

<3:2.1.15-30.el7
  • M
Cross-site Scripting (XSS)

<3:2.1.15-30.el7
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2
  • M
Improper Restriction of Excessive Authentication Attempts

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Cross-site Scripting (XSS)

<3:2.1.15-26.el7_4.1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Directory Traversal

<3:2.1.15-21.el7_1
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Insufficient Verification of Data Authenticity

<3:2.1.15-30.el7
  • M
Cross-site Scripting (XSS)

<3:2.1.15-30.el7
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.15-30.el7_9.2