diff options
author | emkael <emkael@tlen.pl> | 2017-01-02 00:56:16 +0100 |
---|---|---|
committer | emkael <emkael@tlen.pl> | 2017-01-02 00:56:16 +0100 |
commit | 7449a8432875bf9916c3def3c25419f2e2eb99d1 (patch) | |
tree | 8af01bafa4e456a0bf2556ebdb981cdb63b47149 /lib/phpmailer/README.md | |
parent | a6904faaaba78a5d08d2ca83de39457f540ad541 (diff) |
* bumping PHPMailer to 5.2.21
Diffstat (limited to 'lib/phpmailer/README.md')
-rw-r--r-- | lib/phpmailer/README.md | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/lib/phpmailer/README.md b/lib/phpmailer/README.md index 4eeecaf..c865a51 100644 --- a/lib/phpmailer/README.md +++ b/lib/phpmailer/README.md @@ -139,6 +139,16 @@ Build status: [![Build Status](https://travis-ci.org/PHPMailer/PHPMailer.svg)](h If this isn't passing, is there something you can do to help? +## Security + +Please disclose any vulnerabilities found responsibly - report any security problems found to the maintainers privately. + +PHPMailer versions prior to 5.2.20 (released December 28th 2016) are vulnerable to [CVE-2016-10045](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10045) a remote code execution vulnerability, responsibly reported by [Dawid Golunski](https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html), and patched by Paul Buonopane (@Zenexer). + +PHPMailer versions prior to 5.2.18 (released December 2016) are vulnerable to [CVE-2016-10033](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10033) a critical remote code execution vulnerability, responsibly reported by [Dawid Golunski](http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html). + +See [SECURITY](https://github.com/PHPMailer/PHPMailer/tree/master/SECURITY.md) for more detail on security issues. + ## Contributing Please submit bug reports, suggestions and pull requests to the [GitHub issue tracker](https://github.com/PHPMailer/PHPMailer/issues). |