FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-12-18 05:51:40 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1bphpmailer -- Remote Code Execution

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.


Discovery 2017-01-10
Entry 2017-01-12
phpmailer
< 5.2.22

tt-rss
< 2017.01.16

http://www.securityfocus.com/bid/95328/discuss
CVE-2017-5223
3c4693de-ccf7-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.

The first patch of the vulnerability CVE-2016-10033 was incomplete. This advisory demonstrates the bypass of the patch. The bypass allows to carry out Remote Code Execution on all current versions (including 5.2.19).


Discovery 2016-12-28
Entry 2016-12-28
phpmailer
< 5.2.20

tt-rss
< 29.12.2016.04.37

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
CVE-2016-10045