Количество 3 889
Количество 3 889
SUSE-SU-2021:3726-1
Security update for php74
SUSE-SU-2021:2564-1
Security update for php72
SUSE-SU-2021:14668-1
Security update for php53
SUSE-SU-2021:0584-1
Security update for php7
SUSE-SU-2021:0522-1
Security update for php74
SUSE-SU-2021:0498-1
Security update for php72
SUSE-SU-2021:0494-1
Security update for php7
SUSE-SU-2020:2920-1
Security update for php7
SUSE-SU-2020:2894-1
Security update for php5
SUSE-SU-2020:14516-1
Security update for php53
SUSE-SU-2019:2909-1
Security update for php72
SUSE-SU-2019:2819-1
Security update for php7
SUSE-SU-2019:2809-1
Security update for php7
SUSE-SU-2019:0449-1
Security update for php5
RLSA-2019:3736
Critical: php:7.3 security update
RLSA-2019:3735
Critical: php:7.2 security update
GHSA-xcj5-5h7j-93q8
An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
GHSA-x3rx-2m8v-q2vm
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.2.8, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
GHSA-rxcr-7xjm-f9c9
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
GHSA-r9gg-92mp-v9h5
The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data structures.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2021:3726-1 Security update for php74 | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:2564-1 Security update for php72 | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:14668-1 Security update for php53 | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2021:0584-1 Security update for php7 | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2021:0522-1 Security update for php74 | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2021:0498-1 Security update for php72 | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2021:0494-1 Security update for php7 | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2020:2920-1 Security update for php7 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2020:2894-1 Security update for php5 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2020:14516-1 Security update for php53 | 26% Средний | больше 5 лет назад | ||
SUSE-SU-2019:2909-1 Security update for php72 | 94% Критический | больше 6 лет назад | ||
SUSE-SU-2019:2819-1 Security update for php7 | 94% Критический | больше 6 лет назад | ||
SUSE-SU-2019:2809-1 Security update for php7 | 94% Критический | больше 6 лет назад | ||
SUSE-SU-2019:0449-1 Security update for php5 | 86% Высокий | около 7 лет назад | ||
RLSA-2019:3736 Critical: php:7.3 security update | 94% Критический | больше 6 лет назад | ||
RLSA-2019:3735 Critical: php:7.2 security update | 94% Критический | больше 6 лет назад | ||
GHSA-xcj5-5h7j-93q8 An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn. | CVSS3: 7.5 | 16% Средний | почти 4 года назад | |
GHSA-x3rx-2m8v-q2vm When processing certain files, PHP EXIF extension in versions 7.1.x below 7.2.8, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash. | CVSS3: 9.1 | 3% Низкий | почти 4 года назад | |
GHSA-rxcr-7xjm-f9c9 In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. | CVSS3: 5.3 | 0% Низкий | почти 4 года назад | |
GHSA-r9gg-92mp-v9h5 The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data structures. | CVSS3: 9.8 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу