{"id":"CVE-2006-2191","details":"Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is \"unexploitable.","modified":"2024-06-04T04:00:19Z","published":"2006-09-19T21:07:00Z","withdrawn":"2016-08-29T17:57:01Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/21732"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22639"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_25_sr.html"},{"type":"FIX","url":"http://mail.python.org/pipermail/mailman-announce/2006-September/000087.html"},{"type":"WEB","url":"http://people.debian.org/~terpstra/message/20060906.155339.0c0732a4.en.html"}],"affected":[{"package":{"name":"mailman","ecosystem":"Debian:10","purl":"pkg:deb/debian/mailman?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.1.9-1"}]}],"ecosystem_specific":{"urgency":"unimportant"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-2191.json"}}],"schema_version":"1.7.3"}