The exploit is being able to replace the content of an archived message with your own content.
For example, let's say on a security mailing list, someone posts a critical patch for an important piece of software. And an attacker posts an alternate version of the patch that leaves a hole open. Anyone searching the list archive for the patch will get the bad patch instead of the good one.
Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds