Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2016-10033
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHPMailer 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHPMailer是一个用于发送电子邮件的PHP类库。 PHPMailer 5.2.18之前的版本中的isMail transport的‘mailSend’函数存在安全漏洞,该漏洞源于程序没有设置Sender属性。远程攻击者可利用该漏洞向邮件命令中传递额外的参数,并执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2016-10033
#POC DescriptionSource LinkShenlong Link
1PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable containerhttps://github.com/opsxcq/exploit-CVE-2016-10033POC Details
2Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045.https://github.com/Zenexer/safeshellPOC Details
3RCE against WordPress 4.6; Python port of https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.htmlhttps://github.com/GeneralTesler/CVE-2016-10033POC Details
4Code and vulnerable WordPress container for exploiting CVE-2016-10033https://github.com/chipironcin/CVE-2016-10033POC Details
5WordPress 4.6 - Remote Code Execution (RCE) PoC Exploithttps://github.com/Bajunan/CVE-2016-10033POC Details
6Nonehttps://github.com/qwertyuiop12138/CVE-2016-10033POC Details
7Nonehttps://github.com/liusec/WP-CVE-2016-10033POC Details
8Exploits CVE-2016-10033 and CVE-2016-10045https://github.com/pedro823/cve-2016-10033-45POC Details
9To solve CTFS.me problemhttps://github.com/awidardi/opsxcq-cve-2016-10033POC Details
10PHPMailer < 5.2.18 Remote Code Execution Exploit https://github.com/0x00-0x00/CVE-2016-10033POC Details
11cve-2016-10033https://github.com/cved-sources/cve-2016-10033POC Details
12Remote Code Execution vulnerability in PHPMailer.https://github.com/j4k0m/CVE-2016-10033POC Details
13PHPMailer < 5.2.18 Remote Code Executionhttps://github.com/zeeshanbhattined/exploit-CVE-2016-10033POC Details
14wordpress dockerhttps://github.com/CAOlvchonger/CVE-2016-10033POC Details
15CTF based around CVE-2016-10033https://github.com/eb613819/CTF_CVE-2016-10033POC Details
16CVE-2016-10033 Wordpress 4.6 Exploithttps://github.com/ElnurBDa/CVE-2016-10033POC Details
17Proof Of Concept for the CVE-2016-10033 (PHPMailer)https://github.com/Astrowmist/POC-CVE-2016-10033POC Details
18WordPress PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender property in isMail transport.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-10033.yamlPOC Details
19Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Wordpress%204.6%20%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20PwnScriptum.mdPOC Details
20A PoC of CVE-2016-10033 I made for PentesterLab https://github.com/sealldeveloper/CVE-2016-10033-PoCPOC Details
21Nonehttps://github.com/alexander47777/CVE-2016-10033POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2016-10033
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2016-10033
Anonymous User
2025-10-08 03:36:59

Vovan Casino — портал в мир азартных приключений. Здесь каждый спин — шаг в неизведанное. Готовы к приключению? Vovan вход — и вперед к победам! Слоты, рулетка и покер ждут своего героя. Каждая награда — шаг вперёд в вашем путешествии к успеху. Состязания с крупными призами Мгновенные выплаты — заслуженные награды Мобильная версия для игры в пути Vovan Casino — казино для настоящих искателей приключений.


Leave a comment