[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:55029
Multiple vulnerabilities were discovered in the Symfony PHP framework which could lead to cache bypass, authentication bypass, information disclosure, open redirect, cross-site request forgery, deletion of arbitrary files, or arbitrary code execution.

oval:org.secpod.oval:def:115647
Symfony PHP framework . NOTE: Does not require PHPUnit bridge.

oval:org.secpod.oval:def:115646
Symfony PHP framework . NOTE: Does not require PHPUnit bridge.

oval:org.secpod.oval:def:2001517
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti ...

oval:org.secpod.oval:def:115645
PHP framework for web projects

oval:org.secpod.oval:def:115638
Symfony PHP framework . NOTE: Does not require PHPUnit bridge.

oval:org.secpod.oval:def:115637
Symfony PHP framework . NOTE: Does not require PHPUnit bridge.

oval:org.secpod.oval:def:115642
PHP framework for web projects

oval:org.secpod.oval:def:603917
Multiple vulnerabilities were discovered in the Symfony PHP framework which could lead to cache bypass, authentication bypass, information disclosure, open redirect, cross-site request forgery, deletion of arbitrary files, or arbitrary code execution.

CPE    1
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-601
*CVE
CVE-2018-19790

© SecPod Technologies