TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2016-10033

CRITICALCISA KEV
9.8

Beschreibung

The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/30/2016
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerPHP
ProduktPHPMailer
SchwachstellennamePHPMailer Command Injection Vulnerability
KEV Aufnahmedatum2025-07-07
Behebungsfrist2025-07-28
Ransomware-NutzungUnknown

Betroffene Produkte

joomla:joomla\!phpmailer_project:phpmailerwordpress:wordpress

Schwachen (CWE)

CWE-88CWE-88

Referenzen

http://seclists.org/fulldisclosure/2016/Dec/78(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/95108(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037533(af854a3a-2127-422b-91ae-364da2661108)
https://www.drupal.org/psa-2016-004(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40968/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40969/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40970/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40974/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40986/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41962/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/41996/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42024/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42221/(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.