FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  518141
Date:      2019-11-22
Time:      11:15:09Z
Committer: kai

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
3c4693de-ccf7-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.

The first patch of the vulnerability CVE-2016-10033 was incomplete. This advisory demonstrates the bypass of the patch. The bypass allows to carry out Remote Code Execution on all current versions (including 5.2.19).


Discovery 2016-12-28
Entry 2016-12-28
phpmailer
lt 5.2.20

tt-rss
lt 29.12.2016.04.37

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
CVE-2016-10045
c5d79773-8801-11e7-93f7-d43d7e971a1bphpmailer -- XSS in code example and default exeception handler

PHPMailer reports:

Fix XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a .phps extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.


Discovery 2017-07-27
Entry 2017-08-23
phpmailer
lt 5.2.24

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24
CVE-2017-11503
c7656d4c-cb60-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.


Discovery 2016-12-26
Entry 2016-12-26
phpmailer
lt 5.2.18

tt-rss
lt 26.12.2016.07.29

http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
CVE-2016-10033
8a90dc87-89f9-11e5-a408-00248c0c745dPHPmailer -- SMTP injection vulnerability

PHPMailer changelog reports:

Fix vulnerability that allowed email addresses with line breaks (valid in RFC5322) to pass to SMTP, permitting message injection at the SMTP level. Mitigated in both the address validator and in the lower-level SMTP class. Thanks to Takeshi Terada.


Discovery 2015-11-05
Entry 2015-12-03
phpmailer
lt 5.2.14

https://github.com/PHPMailer/PHPMailer/blob/v5.2.14/changelog.md
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1bphpmailer -- Remote Code Execution

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.


Discovery 2017-01-10
Entry 2017-01-12
phpmailer
lt 5.2.22

tt-rss
lt 2017.01.16

http://www.securityfocus.com/bid/95328/discuss
CVE-2017-5223
b036faba-edd8-11e8-b3b7-00e04c1ea73dphpmailer -- Multiple vulnerability

SO-AND-SO reports:

CVE-2018-19296:Fix potential object injection vulnerability.


Discovery 2018-11-16
Entry 2018-11-21
Modified 2018-11-23
phpmailer
lt 5.2.27

phpmailer6
lt 6.0.6

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27
https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6
CVE-2018-19296