Количество 255
Количество 255
GHSA-7w53-hfpw-rg3g
Symfony Arbitrary PHP code Execution
GHSA-7hwc-2cq4-6x2w
Symfony Open Redirect
GHSA-79gr-58r3-pwm3
Symfony Unsafe Cache Serialization Could Enable RCE
GHSA-72x2-5c85-6wmr
Symfony potential Cross-site Scripting in WebhookController
GHSA-66p6-7p29-55p9
Symfony Host Header Injection
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
GHSA-5c58-w9xc-qcj9
Symfony Vulnerable to PHP Eval Injection
GHSA-4vpc-5jx4-cfqg
User enumeration leak using switch user functionality in Symfony
GHSA-3gv2-29qc-v67m
Symfony vulnerable to Session Fixation of CSRF tokens
GHSA-35c5-28pg-2qg4
Symfony Authentication Bypass
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
GHSA-2r5h-6r7v-5m7c
Symphony Vulnerable to PHP Code Injection via YAML Parsing
GHSA-22pv-7v9j-hqxp
Symfony Host Header Injection vulnerability in the HttpFoundation component
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-51736
Symphony process is a module for the Symphony PHP framework which exec ...
CVE-2024-50345
symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-50345
symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-50345
symfony/http-foundation is a module for the Symphony PHP framework whi ...
CVE-2023-46735
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-7w53-hfpw-rg3g Symfony Arbitrary PHP code Execution | 1% Низкий | больше 3 лет назад | ||
GHSA-7hwc-2cq4-6x2w Symfony Open Redirect | CVSS3: 6.1 | 0% Низкий | больше 3 лет назад | |
GHSA-79gr-58r3-pwm3 Symfony Unsafe Cache Serialization Could Enable RCE | CVSS3: 9.8 | 3% Низкий | почти 6 лет назад | |
GHSA-72x2-5c85-6wmr Symfony potential Cross-site Scripting in WebhookController | CVSS3: 6.1 | 2% Низкий | почти 2 года назад | |
GHSA-66p6-7p29-55p9 Symfony Host Header Injection | CVSS3: 7.2 | 0% Низкий | больше 3 лет назад | |
GHSA-5pv8-ppvj-4h68 Prevent user enumeration using Guard or the new Authenticator-based Security | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
GHSA-5c58-w9xc-qcj9 Symfony Vulnerable to PHP Eval Injection | 1% Низкий | больше 3 лет назад | ||
GHSA-4vpc-5jx4-cfqg User enumeration leak using switch user functionality in Symfony | CVSS3: 5.3 | 2% Низкий | почти 6 лет назад | |
GHSA-3gv2-29qc-v67m Symfony vulnerable to Session Fixation of CSRF tokens | CVSS3: 6.3 | 0% Низкий | почти 3 года назад | |
GHSA-35c5-28pg-2qg4 Symfony Authentication Bypass | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-2xhg-w2g5-w95x CSV Injection in symfony/serializer | CVSS3: 6.5 | 1% Низкий | почти 4 года назад | |
GHSA-2r5h-6r7v-5m7c Symphony Vulnerable to PHP Code Injection via YAML Parsing | 1% Низкий | больше 3 лет назад | ||
GHSA-22pv-7v9j-hqxp Symfony Host Header Injection vulnerability in the HttpFoundation component | CVSS3: 6.1 | 1% Низкий | больше 3 лет назад | |
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 0% Низкий | 12 месяцев назад | ||
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 0% Низкий | 12 месяцев назад | ||
CVE-2024-51736 Symphony process is a module for the Symphony PHP framework which exec ... | 0% Низкий | 12 месяцев назад | ||
CVE-2024-50345 symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 3.1 | 0% Низкий | 12 месяцев назад | |
CVE-2024-50345 symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 3.1 | 0% Низкий | 12 месяцев назад | |
CVE-2024-50345 symfony/http-foundation is a module for the Symphony PHP framework whi ... | CVSS3: 3.1 | 0% Низкий | 12 месяцев назад | |
CVE-2023-46735 Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response. | CVSS3: 6.1 | 2% Низкий | почти 2 года назад |
Уязвимостей на страницу