Логотип exploitDog
bind:CVE-2021-3603
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-3603

Количество 5

Количество 5

ubuntu логотип

CVE-2021-3603

больше 4 лет назад

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2021-3603

больше 4 лет назад

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2021-3603

больше 4 лет назад

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-77mr-wc79-m8j3

больше 4 лет назад

PHPMailer untrusted code may be run from an overridden address validator

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2021-03241

больше 4 лет назад

Уязвимость функции validateAddress библиотеки PHPMailer, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ...

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-77mr-wc79-m8j3

PHPMailer untrusted code may be run from an overridden address validator

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
fstec логотип
BDU:2021-03241

Уязвимость функции validateAddress библиотеки PHPMailer, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу