Количество 18
Количество 18

CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below ...

openSUSE-SU-2021:2575-1
Security update for php7

SUSE-SU-2021:2564-1
Security update for php72
GHSA-rxcr-7xjm-f9c9
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

BDU:2021-03703
Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку

openSUSE-SU-2021:2637-1
Security update for php7

openSUSE-SU-2021:1130-1
Security update for php7

SUSE-SU-2021:2637-1
Security update for php7

SUSE-SU-2021:2636-1
Security update for php74

RLSA-2022:1935
Moderate: php:7.4 security update
ELSA-2022-1935
ELSA-2022-1935: php:7.4 security update (MODERATE)

ROS-20220826-01
Множественные уязвимости PHP

SUSE-SU-2022:4069-1
Security update for php7

SUSE-SU-2022:4068-1
Security update for php74

SUSE-SU-2022:4067-1
Security update for php7
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-21705 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-21705 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 5.3 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-21705 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад |
CVE-2021-21705 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below ... | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад | |
![]() | openSUSE-SU-2021:2575-1 Security update for php7 | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2564-1 Security update for php72 | 0% Низкий | почти 4 года назад | |
GHSA-rxcr-7xjm-f9c9 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-03703 Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку | CVSS3: 5.3 | 0% Низкий | почти 4 года назад |
![]() | openSUSE-SU-2021:2637-1 Security update for php7 | почти 4 года назад | ||
![]() | openSUSE-SU-2021:1130-1 Security update for php7 | почти 4 года назад | ||
![]() | SUSE-SU-2021:2637-1 Security update for php7 | почти 4 года назад | ||
![]() | SUSE-SU-2021:2636-1 Security update for php74 | почти 4 года назад | ||
![]() | RLSA-2022:1935 Moderate: php:7.4 security update | около 3 лет назад | ||
ELSA-2022-1935 ELSA-2022-1935: php:7.4 security update (MODERATE) | около 3 лет назад | |||
![]() | ROS-20220826-01 Множественные уязвимости PHP | почти 3 года назад | ||
![]() | SUSE-SU-2022:4069-1 Security update for php7 | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4068-1 Security update for php74 | больше 2 лет назад | ||
![]() | SUSE-SU-2022:4067-1 Security update for php7 | больше 2 лет назад |
Уязвимостей на страницу