cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2018-1294,https://securityvulnerability.io/vulnerability/CVE-2018-1294,,"If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called ""Bounce Address"", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).",Apache,Apache Commons Email,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2018-03-20T17:29:00.000Z,0 CVE-2017-9801,https://securityvulnerability.io/vulnerability/CVE-2017-9801,,"When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.",Apache,Apache Commons Email,7.5,HIGH,0.00267999991774559,false,,false,false,false,,,false,false,,2017-08-07T15:29:00.000Z,0