Safety vulnerability ID: 61169
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion.
Latest version: 3.3.10
Mailman -- the GNU mailing list manager
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application