FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
2eec1e85-faf3-11ea-8ac0-4437e6ad11c4tt-rss -- multiple vulnerabilities

tt-rss project reports:

The cached_url feature mishandles JavaScript inside an SVG document.

imgproxy in plugins/af_proxy_http/init.php mishandles $_REQUEST["url"] in an error message.

It does not validate all URLs before requesting them.

Allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.


Discovery 2020-09-15
Entry 2020-09-20
tt-rss
< g20200919

https://community.tt-rss.org/t/heads-up-several-vulnerabilities-fixed/3799
https://community.tt-rss.org/t/replace-php-gettext/2889
CVE-2020-25789
CVE-2020-25788
CVE-2020-25787
CVE-2016-6175
3c4693de-ccf7-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.

The first patch of the vulnerability CVE-2016-10033 was incomplete. This advisory demonstrates the bypass of the patch. The bypass allows to carry out Remote Code Execution on all current versions (including 5.2.19).


Discovery 2016-12-28
Entry 2016-12-28
phpmailer
< 5.2.20

tt-rss
< 29.12.2016.04.37

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
CVE-2016-10045
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1bphpmailer -- Remote Code Execution

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.


Discovery 2017-01-10
Entry 2017-01-12
phpmailer
< 5.2.22

tt-rss
< 2017.01.16

http://www.securityfocus.com/bid/95328/discuss
CVE-2017-5223
c7656d4c-cb60-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.


Discovery 2016-12-26
Entry 2016-12-26
phpmailer
< 5.2.18

tt-rss
< 26.12.2016.07.29

http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
CVE-2016-10033