Логотип exploitDog
bind:CVE-2024-51736
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-51736

Количество 4

Количество 4

ubuntu логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
nvd логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS: Низкий
debian логотип

CVE-2024-51736

10 месяцев назад

Symphony process is a module for the Symphony PHP framework which exec ...

EPSS: Низкий
github логотип

GHSA-qq5c-677p-737q

11 месяцев назад

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-51736

Symphony process is a module for the Symphony PHP framework which exec ...

0%
Низкий
10 месяцев назад
github логотип
GHSA-qq5c-677p-737q

Symfony vulnerable to command execution hijack on Windows with Process class

CVSS3: 8.4
0%
Низкий
11 месяцев назад

Уязвимостей на страницу