Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"
Symfony

Symfonyфреймворк c открытым исходным кодом, написанный на PHP.

Релизный цикл, информация об уязвимостях

Продукт: Symfony
Вендор: SensioLabs

График релизов

5.46.16.26.37.06.47.17.27.32021202220232024202520262027202820292030

Недавние уязвимости Symfony

Количество 247

github логотип

GHSA-hf4c-m2jg-33qx

около 3 лет назад

lib/form/sfForm.class.php in Symfony CMS before 1.4.20 allows remote attackers to read arbitrary files via a crafted upload request.

EPSS: Низкий
github логотип

GHSA-2r5h-6r7v-5m7c

около 3 лет назад

Symphony Vulnerable to PHP Code Injection via YAML Parsing

EPSS: Низкий
github логотип

GHSA-7w53-hfpw-rg3g

около 3 лет назад

Symfony Arbitrary PHP code Execution

EPSS: Низкий
github логотип

GHSA-35c5-28pg-2qg4

около 3 лет назад

Symfony Authentication Bypass

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-wvj5-r78r-hhfq

около 3 лет назад

Symfony Authentication Bypass

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mm4c-ww47-3x4c

около 3 лет назад

** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor's position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-j5jh-hpr4-h332

около 3 лет назад

Symfony Session Fixation Vulnerability

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-cqqh-94r6-wjrg

около 3 лет назад

Symfony SSRF Vulnerability via Form Component

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-66p6-7p29-55p9

около 3 лет назад

Symfony Host Header Injection

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-mjcw-3g32-5p52

около 3 лет назад

** DISPUTED ** Reflected Cross-site scripting (XSS) vulnerability in the web profiler in SensioLabs Symfony 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the "file" parameter, aka an _profiler/open?file= URI. NOTE: The vendor states "The XSS ... is in the web profiler, a tool that should never be deployed in production (so, we don't handle those issues as security issues)."

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-hf4c-m2jg-33qx

lib/form/sfForm.class.php in Symfony CMS before 1.4.20 allows remote attackers to read arbitrary files via a crafted upload request.

1%
Низкий
около 3 лет назад
github логотип
GHSA-2r5h-6r7v-5m7c

Symphony Vulnerable to PHP Code Injection via YAML Parsing

1%
Низкий
около 3 лет назад
github логотип
GHSA-7w53-hfpw-rg3g

Symfony Arbitrary PHP code Execution

1%
Низкий
около 3 лет назад
github логотип
GHSA-35c5-28pg-2qg4

Symfony Authentication Bypass

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-wvj5-r78r-hhfq

Symfony Authentication Bypass

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-mm4c-ww47-3x4c

** DISPUTED ** The debug handler in Symfony before v2.7.33, 2.8.x before v2.8.26, 3.x before v3.2.13, and 3.3.x before v3.3.6 has XSS via an array key during exception pretty printing in ExceptionHandler.php, as demonstrated by a /_debugbar/open?op=get URI. NOTE: the vendor's position is that this is not a vulnerability because the debug tools are not intended for production use. NOTE: the Symfony Debug component is used by Laravel Debugbar.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-j5jh-hpr4-h332

Symfony Session Fixation Vulnerability

CVSS3: 3.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-cqqh-94r6-wjrg

Symfony SSRF Vulnerability via Form Component

CVSS3: 6.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-66p6-7p29-55p9

Symfony Host Header Injection

CVSS3: 7.2
0%
Низкий
около 3 лет назад
github логотип
GHSA-mjcw-3g32-5p52

** DISPUTED ** Reflected Cross-site scripting (XSS) vulnerability in the web profiler in SensioLabs Symfony 3.3.6 allows remote attackers to inject arbitrary web script or HTML via the "file" parameter, aka an _profiler/open?file= URI. NOTE: The vendor states "The XSS ... is in the web profiler, a tool that should never be deployed in production (so, we don't handle those issues as security issues)."

CVSS3: 6.1
0%
Низкий
около 3 лет назад

Уязвимостей на страницу


Поделиться