Majordomo2 versions 20110121 and below suffer from a directory traversal vulnerability.
a03c592e69350b16a93f9e9d471931b2f2bb19ca8569287d69b3f7af51ae46c6
Majordomo2 suffers from a directory traversal vulnerability in the help command. The parameter named extra is not properly sanitized. Versions 20110203 and below are affected.
a56132a9257c31bde8e4caffddc1080e11f6ed79939595cb7bcf42ff440d659b
Majordomo, the popular mailing list utility, defaults which_access to open in the configuration file. A list of email accounts for a mailing list can be compromised by this de-facto setting by sending which @. Patch included.
8efeb015e6583cfd9603c53d758fcd752e89c4d7096f788f8d997d1a1b2f0abe
Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell.
f73ece74f87e2fff78d541fca10443ea2833f826616305f86792de0c8030f123
The mailinglist software majordomo has several local vulnerabilties. Local commands can be run wuth the UID and GID equal to the one used for majordomo. Exploit details and patch included.
e5ee7bb2c827ab5e443ead682e7790a52f4edeadd0ca30218cadd5031c86e15b
A vulnerability in majordomo allows local users to gain elevated privileges.
792d59158dadd36a7ada42e732b5f076be51ac1491f09ece77427d758fc24205