Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"

Количество 263

Количество 263

github логотип

GHSA-83c3-qx27-2rwr

больше 3 лет назад

Symfony Allows URI Restrictions Bypass Via Double-Encoded String

EPSS: Низкий
github логотип

GHSA-7w53-hfpw-rg3g

больше 3 лет назад

Symfony Arbitrary PHP code Execution

EPSS: Низкий
github логотип

GHSA-7hwc-2cq4-6x2w

больше 3 лет назад

Symfony Open Redirect

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-79gr-58r3-pwm3

около 6 лет назад

Symfony Unsafe Cache Serialization Could Enable RCE

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-72x2-5c85-6wmr

около 2 лет назад

Symfony potential Cross-site Scripting in WebhookController

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-66p6-7p29-55p9

больше 3 лет назад

Symfony Host Header Injection

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-5pv8-ppvj-4h68

больше 4 лет назад

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5c58-w9xc-qcj9

больше 3 лет назад

Symfony Vulnerable to PHP Eval Injection

EPSS: Низкий
github логотип

GHSA-4vpc-5jx4-cfqg

около 6 лет назад

User enumeration leak using switch user functionality in Symfony

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3gv2-29qc-v67m

около 3 лет назад

Symfony vulnerable to Session Fixation of CSRF tokens

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-35c5-28pg-2qg4

больше 3 лет назад

Symfony Authentication Bypass

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2xhg-w2g5-w95x

около 4 лет назад

CSV Injection in symfony/serializer

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2r5h-6r7v-5m7c

больше 3 лет назад

Symphony Vulnerable to PHP Code Injection via YAML Parsing

EPSS: Низкий
github логотип

GHSA-22pv-7v9j-hqxp

больше 3 лет назад

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2026-24739

6 дней назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2026-24739

6 дней назад

Symfony is a PHP framework for web and console applications and a set ...

CVSS3: 6.3
EPSS: Низкий
ubuntu логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
nvd логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

около 1 года назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
ubuntu логотип

CVE-2024-50345

около 1 года назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-83c3-qx27-2rwr

Symfony Allows URI Restrictions Bypass Via Double-Encoded String

0%
Низкий
больше 3 лет назад
github логотип
GHSA-7w53-hfpw-rg3g

Symfony Arbitrary PHP code Execution

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7hwc-2cq4-6x2w

Symfony Open Redirect

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-79gr-58r3-pwm3

Symfony Unsafe Cache Serialization Could Enable RCE

CVSS3: 9.8
3%
Низкий
около 6 лет назад
github логотип
GHSA-72x2-5c85-6wmr

Symfony potential Cross-site Scripting in WebhookController

CVSS3: 6.1
3%
Низкий
около 2 лет назад
github логотип
GHSA-66p6-7p29-55p9

Symfony Host Header Injection

CVSS3: 7.2
0%
Низкий
больше 3 лет назад
github логотип
GHSA-5pv8-ppvj-4h68

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-5c58-w9xc-qcj9

Symfony Vulnerable to PHP Eval Injection

1%
Низкий
больше 3 лет назад
github логотип
GHSA-4vpc-5jx4-cfqg

User enumeration leak using switch user functionality in Symfony

CVSS3: 5.3
2%
Низкий
около 6 лет назад
github логотип
GHSA-3gv2-29qc-v67m

Symfony vulnerable to Session Fixation of CSRF tokens

CVSS3: 6.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-35c5-28pg-2qg4

Symfony Authentication Bypass

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2xhg-w2g5-w95x

CSV Injection in symfony/serializer

CVSS3: 6.5
1%
Низкий
около 4 лет назад
github логотип
GHSA-2r5h-6r7v-5m7c

Symphony Vulnerable to PHP Code Injection via YAML Parsing

1%
Низкий
больше 3 лет назад
github логотип
GHSA-22pv-7v9j-hqxp

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
nvd логотип
CVE-2026-24739

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents

CVSS3: 6.3
0%
Низкий
6 дней назад
debian логотип
CVE-2026-24739

Symfony is a PHP framework for web and console applications and a set ...

CVSS3: 6.3
0%
Низкий
6 дней назад
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

1%
Низкий
около 1 года назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

1%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
около 1 года назад

Уязвимостей на страницу