Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2021-31740
Disclosure Date: November 30, 2022 (last updated October 08, 2023)
SEPPMail's web frontend, user input is not embedded correctly in the web page and therefore leads to cross-site scripting vulnerabilities (XSS).
0
Attacker Value
Unknown
CVE-2021-31739
Disclosure Date: November 18, 2022 (last updated December 22, 2024)
The SEPPmail solution is vulnerable to a Cross-Site Scripting vulnerability (XSS), because user input is not correctly encoded in HTML attributes when returned by the server.SEPPmail 11.1.10 allows XSS via a recipient address.
0
Attacker Value
Unknown
CVE-2021-28975
Disclosure Date: October 21, 2021 (last updated February 23, 2025)
WP Mailster 1.6.18.0 allows XSS when a victim opens a mail server's details in the mst_servers page, for a crafted server_host, server_name, or connection_parameter parameter.
0
Attacker Value
Unknown
CVE-2021-3603
Disclosure Date: June 17, 2021 (last updated February 22, 2025)
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
0
Attacker Value
Unknown
CVE-2021-34551
Disclosure Date: June 16, 2021 (last updated February 22, 2025)
PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname.
0
Attacker Value
Unknown
CVE-2020-36326
Disclosure Date: April 28, 2021 (last updated February 22, 2025)
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.
0
Attacker Value
Unknown
CVE-2020-13625
Disclosure Date: June 08, 2020 (last updated February 21, 2025)
PHPMailer before 6.1.6 contains an output escaping bug when the name of a file attachment contains a double quote character. This can result in the file type being misinterpreted by the receiver or any mail relay processing the message.
0
Attacker Value
Unknown
CVE-2018-19296
Disclosure Date: November 16, 2018 (last updated November 08, 2023)
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
0
Attacker Value
Unknown
CVE-2017-17451
Disclosure Date: December 07, 2017 (last updated November 26, 2024)
The WP Mailster plugin before 1.5.5 for WordPress has XSS in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php.
0
Attacker Value
Unknown
CVE-2017-11503
Disclosure Date: July 20, 2017 (last updated November 26, 2024)
PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php.
0