Количество 3 883
Количество 3 883
SUSE-SU-2021:0494-1
Security update for php7
SUSE-SU-2020:2920-1
Security update for php7
SUSE-SU-2020:2894-1
Security update for php5
SUSE-SU-2020:14516-1
Security update for php53
SUSE-SU-2019:2909-1
Security update for php72
SUSE-SU-2019:2819-1
Security update for php7
SUSE-SU-2019:2809-1
Security update for php7
SUSE-SU-2019:0449-1
Security update for php5
RLSA-2019:3736
Critical: php:7.3 security update
RLSA-2019:3735
Critical: php:7.2 security update
GHSA-xcj5-5h7j-93q8
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
GHSA-x3rx-2m8v-q2vm
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.2.8, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
GHSA-rxcr-7xjm-f9c9
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
GHSA-r9gg-92mp-v9h5
The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data structures.
GHSA-qh78-qfw9-93x9
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
GHSA-q8qf-vj8v-x7r9
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
GHSA-pg67-q5vx-48xq
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
GHSA-mwr9-2r49-jwhg
The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
GHSA-m793-2mj8-wj8q
The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
GHSA-j7r5-hm2w-qqf9
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2021:0494-1 Security update for php7 | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:2920-1 Security update for php7 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2020:2894-1 Security update for php5 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2020:14516-1 Security update for php53 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2019:2909-1 Security update for php72 | 94% Критический | около 6 лет назад | ||
SUSE-SU-2019:2819-1 Security update for php7 | 94% Критический | больше 6 лет назад | ||
SUSE-SU-2019:2809-1 Security update for php7 | 94% Критический | больше 6 лет назад | ||
SUSE-SU-2019:0449-1 Security update for php5 | 88% Высокий | почти 7 лет назад | ||
RLSA-2019:3736 Critical: php:7.3 security update | 94% Критический | около 6 лет назад | ||
RLSA-2019:3735 Critical: php:7.2 security update | 94% Критический | около 6 лет назад | ||
GHSA-xcj5-5h7j-93q8 An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn. | CVSS3: 7.5 | 16% Средний | больше 3 лет назад | |
GHSA-x3rx-2m8v-q2vm When processing certain files, PHP EXIF extension in versions 7.1.x below 7.2.8, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash. | CVSS3: 9.1 | 3% Низкий | больше 3 лет назад | |
GHSA-rxcr-7xjm-f9c9 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
GHSA-r9gg-92mp-v9h5 The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data structures. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-qh78-qfw9-93x9 In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended. | CVSS3: 5.3 | 1% Низкий | около 4 лет назад | |
GHSA-q8qf-vj8v-x7r9 When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash. | CVSS3: 9.1 | 2% Низкий | больше 3 лет назад | |
GHSA-pg67-q5vx-48xq When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | CVSS3: 7.1 | 4% Низкий | больше 3 лет назад | |
GHSA-mwr9-2r49-jwhg The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-m793-2mj8-wj8q The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/". | CVSS3: 5.5 | 1% Низкий | больше 3 лет назад | |
GHSA-j7r5-hm2w-qqf9 In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information. | 26% Средний | больше 3 лет назад |
Уязвимостей на страницу