Логотип exploitDog
bind:CVE-2024-51736
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-51736

Количество 4

Количество 4

ubuntu логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
nvd логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
github логотип

GHSA-qq5c-677p-737q

около 1 года назад

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

1%
Низкий
около 1 года назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

1%
Низкий
около 1 года назад
github логотип
GHSA-qq5c-677p-737q

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
1%
Низкий
около 1 года назад

Уязвимостей на страницу