Логотип exploitDog
bind:"CVE-2021-21703" OR bind:"CVE-2021-21705"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-21703" OR bind:"CVE-2021-21705"

Количество 34

Количество 34

rocky логотип

RLSA-2022:1935

больше 3 лет назад

Moderate: php:7.4 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1935

больше 3 лет назад

ELSA-2022-1935: php:7.4 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2021-21705

около 4 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2021-21705

больше 4 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-21705

около 4 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
EPSS: Низкий
msrc логотип

CVE-2021-21705

около 1 месяца назад

Incorrect URL validation in FILTER_VALIDATE_URL

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2021-21705

около 4 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2021-21703

около 4 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-21703

около 4 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2021-21703

около 4 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-21703

около 1 месяца назад

PHP-FPM memory access in root process leading to privilege escalation

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-21703

около 4 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 a ...

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20220826-01

около 3 лет назад

Множественные уязвимости PHP

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4069-1

почти 3 года назад

Security update for php7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4068-1

почти 3 года назад

Security update for php74

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2575-1

больше 4 лет назад

Security update for php7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2564-1

больше 4 лет назад

Security update for php72

EPSS: Низкий
github логотип

GHSA-rxcr-7xjm-f9c9

больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2021-03703

больше 4 лет назад

Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3727-1

почти 4 года назад

Security update for php72

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:1935

Moderate: php:7.4 security update

больше 3 лет назад
oracle-oval логотип
ELSA-2022-1935

ELSA-2022-1935: php:7.4 security update (MODERATE)

больше 3 лет назад
ubuntu логотип
CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
0%
Низкий
около 4 лет назад
msrc логотип
CVE-2021-21705

Incorrect URL validation in FILTER_VALIDATE_URL

CVSS3: 4.3
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below ...

CVSS3: 4.3
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2021-21703

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-21703

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 6.4
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-21703

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
msrc логотип
CVE-2021-21703

PHP-FPM memory access in root process leading to privilege escalation

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2021-21703

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 a ...

CVSS3: 7.8
0%
Низкий
около 4 лет назад
redos логотип
ROS-20220826-01

Множественные уязвимости PHP

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4069-1

Security update for php7

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4068-1

Security update for php74

почти 3 года назад
suse-cvrf логотип
openSUSE-SU-2021:2575-1

Security update for php7

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2564-1

Security update for php72

0%
Низкий
больше 4 лет назад
github логотип
GHSA-rxcr-7xjm-f9c9

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03703

Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3727-1

Security update for php72

0%
Низкий
почти 4 года назад

Уязвимостей на страницу