Количество 5
Количество 5
CVE-2021-3603
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
CVE-2021-3603
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
CVE-2021-3603
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ...
GHSA-77mr-wc79-m8j3
PHPMailer untrusted code may be run from an overridden address validator
BDU:2021-03241
Уязвимость функции validateAddress библиотеки PHPMailer, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-3603 PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names. | CVSS3: 8.1 | 0% Низкий | больше 4 лет назад | |
CVE-2021-3603 PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names. | CVSS3: 8.1 | 0% Низкий | больше 4 лет назад | |
CVE-2021-3603 PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ... | CVSS3: 8.1 | 0% Низкий | больше 4 лет назад | |
GHSA-77mr-wc79-m8j3 PHPMailer untrusted code may be run from an overridden address validator | CVSS3: 8.1 | 0% Низкий | больше 4 лет назад | |
BDU:2021-03241 Уязвимость функции validateAddress библиотеки PHPMailer, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу