PHPMailer Remote Command Execution Exploit Update

PHPMailer is prone to a abuse the mailSend function. This vulnerability allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.



This updates adds x86/x64 and HTTP/HTTPS Channel Support.
Exploit Type - Old
Exploits/OS Command Injection/Known Vulnerabilities
Exploit Platform
Product Name