Логотип exploitDog
bind:CVE-2017-16654
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-16654

Количество 5

Количество 5

ubuntu логотип

CVE-2017-16654

почти 7 лет назад

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-16654

почти 7 лет назад

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-16654

почти 7 лет назад

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3. ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-c49r-8gj6-768r

около 3 лет назад

Symfony Directory Traversal

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-04114

больше 7 лет назад

Уязвимость компонента Intl программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-16654

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
nvd логотип
CVE-2017-16654

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
debian логотип
CVE-2017-16654

An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3. ...

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
github логотип
GHSA-c49r-8gj6-768r

Symfony Directory Traversal

CVSS3: 7.5
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-04114

Уязвимость компонента Intl программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
1%
Низкий
больше 7 лет назад

Уязвимостей на страницу