{"id":"CVE-2008-5619","details":"html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.","aliases":["GHSA-v5c9-mmw9-829q"],"modified":"2026-01-27T04:09:25.145663Z","published":"2008-12-17T02:30:00Z","withdrawn":"2026-01-27T04:09:25.145663Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/33145"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33170"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34789"},{"type":"ADVISORY","url":"http://sourceforge.net/forum/forum.php?forum_id=898542"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/3418"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/3419"},{"type":"EVIDENCE","url":"http://trac.roundcube.net/changeset/2148"},{"type":"EVIDENCE","url":"http://trac.roundcube.net/ticket/1485618"},{"type":"FIX","url":"https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a"},{"type":"WEB","url":"http://mahara.org/interaction/forum/topic.php?id=533"},{"type":"WEB","url":"http://osvdb.org/53893"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2008/12/12/1"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/499489/100/0/threaded"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/7549"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/7553"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html"}],"schema_version":"1.7.3"}