Логотип exploitDog
bind:"BDU:2022-02562" OR bind:"CVE-2016-10397"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-02562" OR bind:"CVE-2016-10397"

Количество 11

Количество 11

fstec логотип

BDU:2022-02562

почти 8 лет назад

Уязвимость функции parse_url интерпретатора языка программирования PHP, позволяющая нарушителю подменить отображаемый URL

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2016-10397

почти 8 лет назад

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2016-10397

больше 8 лет назад

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2016-10397

почти 8 лет назад

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-10397

почти 8 лет назад

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of vari ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-25h5-rq96-q5mq

около 3 лет назад

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:2366-1

почти 8 лет назад

Security update for php5

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:2337-1

почти 8 лет назад

Security update for php7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2317-1

почти 8 лет назад

Security update for php5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2303-1

почти 8 лет назад

Security update for php7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2522-1

почти 8 лет назад

Security update for php53

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-02562

Уязвимость функции parse_url интерпретатора языка программирования PHP, позволяющая нарушителю подменить отображаемый URL

CVSS3: 7.5
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2016-10397

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2016-10397

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 5.4
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-10397

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2016-10397

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of vari ...

CVSS3: 7.5
0%
Низкий
почти 8 лет назад
github логотип
GHSA-25h5-rq96-q5mq

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

CVSS3: 7.5
0%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2017:2366-1

Security update for php5

почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:2337-1

Security update for php7

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2317-1

Security update for php5

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2303-1

Security update for php7

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2522-1

Security update for php53

почти 8 лет назад

Уязвимостей на страницу