Логотип exploitDog
product: "symfony"
Консоль
Логотип exploitDog

exploitDog

product: "symfony"

Количество 255

Количество 255

github логотип

GHSA-7w53-hfpw-rg3g

больше 3 лет назад

Symfony Arbitrary PHP code Execution

EPSS: Низкий
github логотип

GHSA-7hwc-2cq4-6x2w

больше 3 лет назад

Symfony Open Redirect

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-79gr-58r3-pwm3

почти 6 лет назад

Symfony Unsafe Cache Serialization Could Enable RCE

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-72x2-5c85-6wmr

почти 2 года назад

Symfony potential Cross-site Scripting in WebhookController

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-66p6-7p29-55p9

больше 3 лет назад

Symfony Host Header Injection

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-5pv8-ppvj-4h68

больше 4 лет назад

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5c58-w9xc-qcj9

больше 3 лет назад

Symfony Vulnerable to PHP Eval Injection

EPSS: Низкий
github логотип

GHSA-4vpc-5jx4-cfqg

почти 6 лет назад

User enumeration leak using switch user functionality in Symfony

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3gv2-29qc-v67m

почти 3 года назад

Symfony vulnerable to Session Fixation of CSRF tokens

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-35c5-28pg-2qg4

больше 3 лет назад

Symfony Authentication Bypass

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2xhg-w2g5-w95x

почти 4 года назад

CSV Injection in symfony/serializer

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-2r5h-6r7v-5m7c

больше 3 лет назад

Symphony Vulnerable to PHP Code Injection via YAML Parsing

EPSS: Низкий
github логотип

GHSA-22pv-7v9j-hqxp

больше 3 лет назад

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2024-51736

12 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
nvd логотип

CVE-2024-51736

12 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

12 месяцев назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
ubuntu логотип

CVE-2024-50345

12 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2024-50345

12 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2024-50345

12 месяцев назад

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
EPSS: Низкий
ubuntu логотип

CVE-2023-46735

почти 2 года назад

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-7w53-hfpw-rg3g

Symfony Arbitrary PHP code Execution

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7hwc-2cq4-6x2w

Symfony Open Redirect

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-79gr-58r3-pwm3

Symfony Unsafe Cache Serialization Could Enable RCE

CVSS3: 9.8
3%
Низкий
почти 6 лет назад
github логотип
GHSA-72x2-5c85-6wmr

Symfony potential Cross-site Scripting in WebhookController

CVSS3: 6.1
2%
Низкий
почти 2 года назад
github логотип
GHSA-66p6-7p29-55p9

Symfony Host Header Injection

CVSS3: 7.2
0%
Низкий
больше 3 лет назад
github логотип
GHSA-5pv8-ppvj-4h68

Prevent user enumeration using Guard or the new Authenticator-based Security

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-5c58-w9xc-qcj9

Symfony Vulnerable to PHP Eval Injection

1%
Низкий
больше 3 лет назад
github логотип
GHSA-4vpc-5jx4-cfqg

User enumeration leak using switch user functionality in Symfony

CVSS3: 5.3
2%
Низкий
почти 6 лет назад
github логотип
GHSA-3gv2-29qc-v67m

Symfony vulnerable to Session Fixation of CSRF tokens

CVSS3: 6.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-35c5-28pg-2qg4

Symfony Authentication Bypass

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2xhg-w2g5-w95x

CSV Injection in symfony/serializer

CVSS3: 6.5
1%
Низкий
почти 4 года назад
github логотип
GHSA-2r5h-6r7v-5m7c

Symphony Vulnerable to PHP Code Injection via YAML Parsing

1%
Низкий
больше 3 лет назад
github логотип
GHSA-22pv-7v9j-hqxp

Symfony Host Header Injection vulnerability in the HttpFoundation component

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

0%
Низкий
12 месяцев назад
ubuntu логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 3.1
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-50345

symfony/http-foundation is a module for the Symphony PHP framework whi ...

CVSS3: 3.1
0%
Низкий
12 месяцев назад
ubuntu логотип
CVE-2023-46735

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Starting in version 6.0.0 and prior to version 6.3.8, the error message in `WebhookController` returns unescaped user-submitted input. As of version 6.3.8, `WebhookController` now doesn't return any user-submitted input in its response.

CVSS3: 6.1
2%
Низкий
почти 2 года назад

Уязвимостей на страницу