Unrated severityNVD Advisory· Published Apr 13, 2015· Updated May 6, 2026
CVE-2015-2775
CVE-2015-2775
Description
Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- mail.python.org/pipermail/mailman-developers/2015-March/024875.htmlnvdExploit
- mail.python.org/pipermail/mailman-developers/2015-March/024871.htmlnvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1153.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1417.htmlnvd
- www.debian.org/security/2015/dsa-3214nvd
- www.securityfocus.com/bid/73922nvd
- www.securitytracker.com/id/1032033nvd
- www.ubuntu.com/usn/USN-2558-1nvd
- bugs.launchpad.net/mailman/+bug/1437145nvd
- mail.python.org/pipermail/mailman-announce/2015-March/000209.htmlnvd
News mentions
0No linked articles in our index yet.