Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"
Symfony

Symfonyфреймворк c открытым исходным кодом, написанный на PHP.

Релизный цикл, информация об уязвимостях

Продукт: Symfony
Вендор: SensioLabs

График релизов

5.46.16.26.37.06.47.17.27.32021202220232024202520262027202820292030

Недавние уязвимости Symfony

Количество 255

nvd логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
nvd логотип

CVE-2024-50345

10 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2024-50345

10 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
EPSS: Низкий
ubuntu логотип

CVE-2024-50345

10 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
ubuntu логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
github логотип

GHSA-qq5c-677p-737q

11 месяцев назад

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-mrqx-rp3w-jpjp

11 месяцев назад

Symfony vulnerable to open redirect via browser-sanitized URLs

CVSS3: 3.1
EPSS: Низкий
fstec логотип

BDU:2024-10003

11 месяцев назад

Уязвимость компонента Process программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-07865

11 месяцев назад

Уязвимость компонента http-foundation программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
0%
Низкий
10 месяцев назад
ubuntu логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
10 месяцев назад
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
10 месяцев назад
github логотип
GHSA-qq5c-677p-737q

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
0%
Низкий
11 месяцев назад
github логотип
GHSA-mrqx-rp3w-jpjp

Symfony vulnerable to open redirect via browser-sanitized URLs

CVSS3: 3.1
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2024-10003

Уязвимость компонента Process программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 7.5
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-07865

Уязвимость компонента http-foundation программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.1
0%
Низкий
11 месяцев назад

Уязвимостей на страницу


Поделиться