Количество 5
Количество 5
CVE-2018-1294
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
CVE-2018-1294
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
CVE-2018-1294
If a user of Apache Commons Email (typically an application programmer ...
openSUSE-SU-2018:0370-1
Security update for apache-commons-email
GHSA-v7cm-w955-pj6g
Improper Input Validation Apache Commons Email
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-1294 If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String). | CVSS3: 7.5 | 1% Низкий | почти 8 лет назад | |
CVE-2018-1294 If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String). | CVSS3: 7.5 | 1% Низкий | почти 8 лет назад | |
CVE-2018-1294 If a user of Apache Commons Email (typically an application programmer ... | CVSS3: 7.5 | 1% Низкий | почти 8 лет назад | |
openSUSE-SU-2018:0370-1 Security update for apache-commons-email | 1% Низкий | около 8 лет назад | ||
GHSA-v7cm-w955-pj6g Improper Input Validation Apache Commons Email | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу