Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

Symfony

Symfonyфреймворк c открытым исходным кодом, написанный на PHP.

Релизный цикл, информация об уязвимостях

Продукт: Symfony
Вендор: SensioLabs

График релизов

5.46.16.26.37.06.47.17.27.38.07.42021202220232024202520262027202820292030

Недавние уязвимости Symfony

Количество 255

nvd логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
nvd логотип

CVE-2024-50345

около 1 года назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2024-50345

около 1 года назад

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
EPSS: Низкий
ubuntu логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
ubuntu логотип

CVE-2024-50345

около 1 года назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-qq5c-677p-737q

около 1 года назад

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-mrqx-rp3w-jpjp

около 1 года назад

Symfony vulnerable to open redirect via browser-sanitized URLs

CVSS3: 3.1
EPSS: Низкий
fstec логотип

BDU:2024-10003

около 1 года назад

Уязвимость компонента Process программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-07865

около 1 года назад

Уязвимость компонента http-foundation программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
около 1 года назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
около 1 года назад
github логотип
GHSA-qq5c-677p-737q

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
0%
Низкий
около 1 года назад
github логотип
GHSA-mrqx-rp3w-jpjp

Symfony vulnerable to open redirect via browser-sanitized URLs

CVSS3: 3.1
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-10003

Уязвимость компонента Process программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 7.5
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-07865

Уязвимость компонента http-foundation программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.1
0%
Низкий
около 1 года назад

Уязвимостей на страницу


Поделиться