Количество 8
Количество 8

BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept ...

SUSE-SU-2017:1709-1
Security update for php53
GHSA-943r-xvqq-r4rh
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

SUSE-SU-2017:1585-1
Security update for php53
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-01643 Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 6.1 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7272 PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. | CVSS3: 7.4 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7272 PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. | CVSS3: 5.4 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7272 PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. | CVSS3: 7.4 | 0% Низкий | около 8 лет назад |
CVE-2017-7272 PHP through 7.1.11 enables potential SSRF in applications that accept ... | CVSS3: 7.4 | 0% Низкий | около 8 лет назад | |
![]() | SUSE-SU-2017:1709-1 Security update for php53 | 0% Низкий | почти 8 лет назад | |
GHSA-943r-xvqq-r4rh PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. | CVSS3: 7.4 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2017:1585-1 Security update for php53 | около 8 лет назад |
Уязвимостей на страницу