mailman:2.1/mailman/.../mailman vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mailman:2.1/mailman package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13467+746daedf.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13467+746daedf.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-6.module+el8.2.0+13543+86b2c701
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13467+746daedf.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-5.module+el8.1.0+13542+e9b93c88
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-6.module+el8.2.0+13543+86b2c701
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13467+746daedf.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-6.module+el8.2.0+13543+86b2c701
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13466+327eb9f3.2
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-6.module+el8.2.0+13543+86b2c701
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.1.0+13242+45286865.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-4.module+el8.1.0+13242+45286865.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Cross-site Request Forgery (CSRF)

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Information Exposure

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-4.module+el8.1.0+13242+45286865.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Information Exposure

<3:2.1.29-4.module+el8.1.0+13242+45286865.1
  • H
Information Exposure

<3:2.1.29-4.module+el8.2.0+13241+705a6aa4.3
  • H
Information Exposure

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-12.module+el8.5.0+13211+e8845b76.1
  • H
Information Exposure

<3:2.1.29-11.module+el8.4.0+13212+81332387.1
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-11.module+el8.4.0+8277+5e2c6e6e
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b
  • M
Cross-site Scripting (XSS)

<3:2.1.29-10.module+el8.3.0+6860+8e47d84b