Логотип exploitDog
bind:CVE-2021-3007
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-3007

Количество 2

Количество 2

nvd логотип

CVE-2021-3007

больше 4 лет назад

Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-xx8f-qf9f-5fgw

около 4 лет назад

Remote code execution in zendframework and laminas-http

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-3007

Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized

CVSS3: 9.8
80%
Высокий
больше 4 лет назад
github логотип
GHSA-xx8f-qf9f-5fgw

Remote code execution in zendframework and laminas-http

CVSS3: 9.8
80%
Высокий
около 4 лет назад

Уязвимостей на страницу