Количество 11
Количество 11

BDU:2022-02562
Уязвимость функции parse_url интерпретатора языка программирования PHP, позволяющая нарушителю подменить отображаемый URL

CVE-2016-10397
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVE-2016-10397
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVE-2016-10397
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
CVE-2016-10397
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of vari ...
GHSA-25h5-rq96-q5mq
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

openSUSE-SU-2017:2366-1
Security update for php5

openSUSE-SU-2017:2337-1
Security update for php7

SUSE-SU-2017:2317-1
Security update for php5

SUSE-SU-2017:2303-1
Security update for php7

SUSE-SU-2017:2522-1
Security update for php53
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-02562 Уязвимость функции parse_url интерпретатора языка программирования PHP, позволяющая нарушителю подменить отображаемый URL | CVSS3: 7.5 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2016-10397 In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c). | CVSS3: 7.5 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2016-10397 In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c). | CVSS3: 5.4 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-10397 In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c). | CVSS3: 7.5 | 0% Низкий | почти 8 лет назад |
CVE-2016-10397 In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of vari ... | CVSS3: 7.5 | 0% Низкий | почти 8 лет назад | |
GHSA-25h5-rq96-q5mq In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c). | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2017:2366-1 Security update for php5 | почти 8 лет назад | ||
![]() | openSUSE-SU-2017:2337-1 Security update for php7 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2317-1 Security update for php5 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2303-1 Security update for php7 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2522-1 Security update for php53 | почти 8 лет назад |
Уязвимостей на страницу