Логотип exploitDog
bind:CVE-2018-1294
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1294

Количество 5

Количество 5

ubuntu логотип

CVE-2018-1294

почти 8 лет назад

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2018-1294

почти 8 лет назад

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-1294

почти 8 лет назад

If a user of Apache Commons Email (typically an application programmer ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0370-1

около 8 лет назад

Security update for apache-commons-email

EPSS: Низкий
github логотип

GHSA-v7cm-w955-pj6g

больше 3 лет назад

Improper Input Validation Apache Commons Email

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer ...

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0370-1

Security update for apache-commons-email

1%
Низкий
около 8 лет назад
github логотип
GHSA-v7cm-w955-pj6g

Improper Input Validation Apache Commons Email

CVSS3: 7.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу