Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-5619

Опубликовано: 09 дек. 2008
Источник: redhat
EPSS Высокий

Описание

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=476223roundcubemail: Remotely exploitable code injection vulnerability

EPSS

Процентиль: 99%
0.77735
Высокий

Связанные уязвимости

ubuntu
около 17 лет назад

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

nvd
около 17 лет назад

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

debian
около 17 лет назад

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMaile ...

github
больше 3 лет назад

PHPMailer susceptible to arbitrary code execution

EPSS

Процентиль: 99%
0.77735
Высокий