FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  516967
Date:      2019-11-07
Time:      12:09:25Z
Committer: dmgk

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
c7656d4c-cb60-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.


Discovery 2016-12-26
Entry 2016-12-26
phpmailer
lt 5.2.18

tt-rss
lt 26.12.2016.07.29

http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
CVE-2016-10033
3c4693de-ccf7-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.

The first patch of the vulnerability CVE-2016-10033 was incomplete. This advisory demonstrates the bypass of the patch. The bypass allows to carry out Remote Code Execution on all current versions (including 5.2.19).


Discovery 2016-12-28
Entry 2016-12-28
phpmailer
lt 5.2.20

tt-rss
lt 29.12.2016.04.37

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
CVE-2016-10045
c5d79773-8801-11e7-93f7-d43d7e971a1bphpmailer -- XSS in code example and default exeception handler

PHPMailer reports:

Fix XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a .phps extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.


Discovery 2017-07-27
Entry 2017-08-23
phpmailer
lt 5.2.24

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24
CVE-2017-11503
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1bphpmailer -- Remote Code Execution

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.


Discovery 2017-01-10
Entry 2017-01-12
phpmailer
lt 5.2.22

tt-rss
lt 2017.01.16

http://www.securityfocus.com/bid/95328/discuss
CVE-2017-5223
b036faba-edd8-11e8-b3b7-00e04c1ea73dphpmailer -- Multiple vulnerability

SO-AND-SO reports:

CVE-2018-19296:Fix potential object injection vulnerability.


Discovery 2018-11-16
Entry 2018-11-21
Modified 2018-11-23
phpmailer
lt 5.2.27

phpmailer6
lt 6.0.6

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27
https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6
CVE-2018-19296