Количество 6
Количество 6

CVE-2024-50343
symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-50343
symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-50343
symfony/validator is a module for the Symphony PHP framework which pro ...
GHSA-g3rh-rrhp-jhh9
Symfony has an incorrect response from Validator when input ends with `\n`

BDU:2025-07864
Уязвимость компонента validator программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным

ROS-20250630-03
Множественные уязвимости php-symfony4
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-50343 symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 3.1 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-50343 symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 3.1 | 0% Низкий | 9 месяцев назад |
CVE-2024-50343 symfony/validator is a module for the Symphony PHP framework which pro ... | CVSS3: 3.1 | 0% Низкий | 9 месяцев назад | |
GHSA-g3rh-rrhp-jhh9 Symfony has an incorrect response from Validator when input ends with `\n` | CVSS3: 3.1 | 0% Низкий | 9 месяцев назад | |
![]() | BDU:2025-07864 Уязвимость компонента validator программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 3.1 | 0% Низкий | 12 месяцев назад |
![]() | ROS-20250630-03 Множественные уязвимости php-symfony4 | CVSS3: 7.3 | около 1 месяца назад |
Уязвимостей на страницу