Safety vulnerability ID: 70735
The information on this page was manually curated by our Cybersecurity Intelligence Team.
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
Latest version: 3.3.10
Mailman -- the GNU mailing list manager
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application