Количество 263
Количество 263
GHSA-83c3-qx27-2rwr
Symfony Allows URI Restrictions Bypass Via Double-Encoded String
GHSA-7w53-hfpw-rg3g
Symfony Arbitrary PHP code Execution
GHSA-7hwc-2cq4-6x2w
Symfony Open Redirect
GHSA-79gr-58r3-pwm3
Symfony Unsafe Cache Serialization Could Enable RCE
GHSA-72x2-5c85-6wmr
Symfony potential Cross-site Scripting in WebhookController
GHSA-66p6-7p29-55p9
Symfony Host Header Injection
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
GHSA-5c58-w9xc-qcj9
Symfony Vulnerable to PHP Eval Injection
GHSA-4vpc-5jx4-cfqg
User enumeration leak using switch user functionality in Symfony
GHSA-3gv2-29qc-v67m
Symfony vulnerable to Session Fixation of CSRF tokens
GHSA-35c5-28pg-2qg4
Symfony Authentication Bypass
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
GHSA-2r5h-6r7v-5m7c
Symphony Vulnerable to PHP Code Injection via YAML Parsing
GHSA-22pv-7v9j-hqxp
Symfony Host Header Injection vulnerability in the HttpFoundation component
CVE-2026-24739
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents
CVE-2026-24739
Symfony is a PHP framework for web and console applications and a set ...
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which exec ...
CVE-2024-50345
symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-83c3-qx27-2rwr Symfony Allows URI Restrictions Bypass Via Double-Encoded String | 0% Низкий | больше 3 лет назад | ||
GHSA-7w53-hfpw-rg3g Symfony Arbitrary PHP code Execution | 1% Низкий | больше 3 лет назад | ||
GHSA-7hwc-2cq4-6x2w Symfony Open Redirect | CVSS3: 6.1 | 0% Низкий | больше 3 лет назад | |
GHSA-79gr-58r3-pwm3 Symfony Unsafe Cache Serialization Could Enable RCE | CVSS3: 9.8 | 3% Низкий | около 6 лет назад | |
GHSA-72x2-5c85-6wmr Symfony potential Cross-site Scripting in WebhookController | CVSS3: 6.1 | 3% Низкий | около 2 лет назад | |
GHSA-66p6-7p29-55p9 Symfony Host Header Injection | CVSS3: 7.2 | 0% Низкий | больше 3 лет назад | |
GHSA-5pv8-ppvj-4h68 Prevent user enumeration using Guard or the new Authenticator-based Security | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
GHSA-5c58-w9xc-qcj9 Symfony Vulnerable to PHP Eval Injection | 1% Низкий | больше 3 лет назад | ||
GHSA-4vpc-5jx4-cfqg User enumeration leak using switch user functionality in Symfony | CVSS3: 5.3 | 2% Низкий | около 6 лет назад | |
GHSA-3gv2-29qc-v67m Symfony vulnerable to Session Fixation of CSRF tokens | CVSS3: 6.3 | 0% Низкий | около 3 лет назад | |
GHSA-35c5-28pg-2qg4 Symfony Authentication Bypass | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-2xhg-w2g5-w95x CSV Injection in symfony/serializer | CVSS3: 6.5 | 1% Низкий | около 4 лет назад | |
GHSA-2r5h-6r7v-5m7c Symphony Vulnerable to PHP Code Injection via YAML Parsing | 1% Низкий | больше 3 лет назад | ||
GHSA-22pv-7v9j-hqxp Symfony Host Header Injection vulnerability in the HttpFoundation component | CVSS3: 6.1 | 1% Низкий | больше 3 лет назад | |
CVE-2026-24739 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents | CVSS3: 6.3 | 0% Низкий | 6 дней назад | |
CVE-2026-24739 Symfony is a PHP framework for web and console applications and a set ... | CVSS3: 6.3 | 0% Низкий | 6 дней назад | |
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 1% Низкий | около 1 года назад | ||
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 1% Низкий | около 1 года назад | ||
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which exec ... | 1% Низкий | около 1 года назад | ||
CVE-2024-50345 symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 3.1 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу