summaryrefslogtreecommitdiff
path: root/lib/phpmailer/README.md
diff options
context:
space:
mode:
authoremkael <emkael@tlen.pl>2017-01-02 00:56:16 +0100
committeremkael <emkael@tlen.pl>2017-01-02 00:56:16 +0100
commit7449a8432875bf9916c3def3c25419f2e2eb99d1 (patch)
tree8af01bafa4e456a0bf2556ebdb981cdb63b47149 /lib/phpmailer/README.md
parenta6904faaaba78a5d08d2ca83de39457f540ad541 (diff)
* bumping PHPMailer to 5.2.21
Diffstat (limited to 'lib/phpmailer/README.md')
-rw-r--r--lib/phpmailer/README.md10
1 files changed, 10 insertions, 0 deletions
diff --git a/lib/phpmailer/README.md b/lib/phpmailer/README.md
index 4eeecaf..c865a51 100644
--- a/lib/phpmailer/README.md
+++ b/lib/phpmailer/README.md
@@ -139,6 +139,16 @@ Build status: [![Build Status](https://travis-ci.org/PHPMailer/PHPMailer.svg)](h
If this isn't passing, is there something you can do to help?
+## Security
+
+Please disclose any vulnerabilities found responsibly - report any security problems found to the maintainers privately.
+
+PHPMailer versions prior to 5.2.20 (released December 28th 2016) are vulnerable to [CVE-2016-10045](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10045) a remote code execution vulnerability, responsibly reported by [Dawid Golunski](https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html), and patched by Paul Buonopane (@Zenexer).
+
+PHPMailer versions prior to 5.2.18 (released December 2016) are vulnerable to [CVE-2016-10033](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10033) a critical remote code execution vulnerability, responsibly reported by [Dawid Golunski](http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html).
+
+See [SECURITY](https://github.com/PHPMailer/PHPMailer/tree/master/SECURITY.md) for more detail on security issues.
+
## Contributing
Please submit bug reports, suggestions and pull requests to the [GitHub issue tracker](https://github.com/PHPMailer/PHPMailer/issues).