CVE-2006-2191

Source
https://cve.org/CVERecord?id=CVE-2006-2191
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-2191.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-2191
Withdrawn
2016-08-29T17:57:01Z
Published
2006-09-19T21:07:00Z
Modified
2024-06-04T04:00:19Z
Summary
[none]
Details

Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.

References

Affected packages

Debian:10 / mailman

Package

Name
mailman
Purl
pkg:deb/debian/mailman?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.1.9-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-2191.json"