Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown

CVE-2021-31740

Disclosure Date: November 30, 2022 (last updated October 08, 2023)
SEPPMail's web frontend, user input is not embedded correctly in the web page and therefore leads to cross-site scripting vulnerabilities (XSS).
Attacker Value
Unknown

CVE-2021-31739

Disclosure Date: November 18, 2022 (last updated December 22, 2024)
The SEPPmail solution is vulnerable to a Cross-Site Scripting vulnerability (XSS), because user input is not correctly encoded in HTML attributes when returned by the server.SEPPmail 11.1.10 allows XSS via a recipient address.
Attacker Value
Unknown

CVE-2021-28975

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
WP Mailster 1.6.18.0 allows XSS when a victim opens a mail server's details in the mst_servers page, for a crafted server_host, server_name, or connection_parameter parameter.
Attacker Value
Unknown

CVE-2021-3603

Disclosure Date: June 17, 2021 (last updated February 22, 2025)
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
Attacker Value
Unknown

CVE-2021-34551

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname.
Attacker Value
Unknown

CVE-2020-36326

Disclosure Date: April 28, 2021 (last updated February 22, 2025)
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.
Attacker Value
Unknown

CVE-2020-13625

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
PHPMailer before 6.1.6 contains an output escaping bug when the name of a file attachment contains a double quote character. This can result in the file type being misinterpreted by the receiver or any mail relay processing the message.
Attacker Value
Unknown

CVE-2018-19296

Disclosure Date: November 16, 2018 (last updated November 08, 2023)
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
Attacker Value
Unknown

CVE-2017-17451

Disclosure Date: December 07, 2017 (last updated November 26, 2024)
The WP Mailster plugin before 1.5.5 for WordPress has XSS in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php.
0
Attacker Value
Unknown

CVE-2017-11503

Disclosure Date: July 20, 2017 (last updated November 26, 2024)
PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php.
0