CVE-2020-7070
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: Low Impact
- Attack Vector: NETWORK
- Privileges Required: None
- Scope: UNCHANGED
- User Interaction: REQUIRED
CIA Impact Definition
- Confidentiality:
- Integrity: Low Impact
- Availability:
CVE-2020-7070 Vulnerability Summary
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
Access Complexity Graph for CVE-2020-7070
Impact Analysis for CVE-2020-7070
CVE-2020-7070: Detailed Information and External References
EPSS
0.00285
EPSS %
0.68684
References
0.00285
- http://cve.circl.lu/cve/CVE-2020-8184
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html
- https://bugs.php.net/bug.php?id=79699
- https://hackerone.com/reports/895727
- https://lists.debian.org/debian-lts-announce/2020/10/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/
- https://security.gentoo.org/glsa/202012-16
- https://security.netapp.com/advisory/ntap-20201016-0001/
- https://usn.ubuntu.com/4583-1/
- https://www.debian.org/security/2021/dsa-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- http://cve.circl.lu/cve/CVE-2020-8184
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html
- https://bugs.php.net/bug.php?id=79699
- https://hackerone.com/reports/895727
- https://lists.debian.org/debian-lts-announce/2020/10/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/
- https://security.gentoo.org/glsa/202012-16
- https://security.netapp.com/advisory/ntap-20201016-0001/
- https://usn.ubuntu.com/4583-1/
- https://www.debian.org/security/2021/dsa-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
CWE
CWE-565
CAPEC
0.00285
- Session Credential Falsification through Manipulation: An attacker manipulates an existing credential in order to gain access to a target application. Session credentials allow users to identify themselves to a service after an initial authentication without needing to resend the authentication information (usually a username and password) with every message. An attacker may be able to manipulate a credential sniffed from an existing connection in order to gain access to a target server.
- Accessing/Intercepting/Modifying HTTP Cookies: This attack relies on the use of HTTP Cookies to store credentials, state information and other critical data on client systems. There are several different forms of this attack. The first form of this attack involves accessing HTTP Cookies to mine for potentially sensitive data contained therein. The second form involves intercepting this data as it is transmitted from client to server. This intercepted information is then used by the adversary to impersonate the remote user/session. The third form is when the cookie's content is modified by the adversary before it is sent back to the server. Here the adversary seeks to convince the target server to operate on this falsified information.
- Manipulating Opaque Client-based Data Tokens: In circumstances where an application holds important data client-side in tokens (cookies, URLs, data files, and so forth) that data can be manipulated. If client or server-side application components reinterpret that data as authentication tokens or data (such as store item pricing or wallet information) then even opaquely manipulating that data may bear fruit for an Attacker. In this pattern an attacker undermines the assumption that client side tokens have been adequately protected from tampering through use of encryption or obfuscation.
Vulnerable Configurations
-
cpe:2.3:a:php:php:7.2.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc4:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc5:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc5:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:rc6:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:rc6:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:beta1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:beta2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:beta3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:alpha1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:alpha2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:alpha3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.1:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.1:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.1:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.2:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.2:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.2:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.3:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.3:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.3:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.4:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.4:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.4:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.4:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.5:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.5:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.5:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.5:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.6:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.6:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.6:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.6:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.7:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.7:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.7:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.7:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.8:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.8:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.8:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.8:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.9:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.9:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.9:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.9:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.10:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.10:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.10:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.10:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.11:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.11:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.11:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.11:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.12:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.12:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.12:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.12:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.13:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.13:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.13:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.13:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.14:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.14:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.14:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.14:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.15:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.16:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.17:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.18:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.19:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.19:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.20:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.20:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.21:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.21:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.22:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.22:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.23:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.23:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.24:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.24:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.25:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.25:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.26:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.26:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.27:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.27:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.29:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.29:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.30:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.30:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.31:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.31:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.32:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.32:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.2.33:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.33:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc4:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc4:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc5:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc5:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:rc6:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:rc6:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:beta1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:beta2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:beta3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:alpha1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:alpha2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:alpha3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.0:alpha4:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.1:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.1:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.1:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.1:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.2:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.2:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.2:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.2:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.3:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.3:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.3:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.3:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.4:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.5:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.6:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.7:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.8:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.9:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.10:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.11:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.12:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.13:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.14:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.15:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.16:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.17:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.18:*:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.19:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.19:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.19:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.19:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.20:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.20:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.20:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.20:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.21:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.21:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.21:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.21:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.22:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.22:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.3.22:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.3.22:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc4:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc4:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc5:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc5:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:rc6:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:rc6:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:beta1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:beta2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:beta4:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:alpha1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:alpha2:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:alpha3:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.1:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.1:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.1:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.1:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.2:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.2:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.2:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.2:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.3:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.3:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.3:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.3:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.4:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.4:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.4:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.4:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.5:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.5:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.5:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.5:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.6:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.6:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.6:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.6:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.7:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.7:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.7:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.7:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.8:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.8:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.8:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.8:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.9:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.9:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.9:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.9:rc1:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.10:-:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.10:-:*:*:*:*:*:*
-
cpe:2.3:a:php:php:7.4.10:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.10:rc1:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
-
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
-
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
-
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
-
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:-:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:-:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.13.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.13.0:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.14.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.14.0:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.14.1:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.14.1:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.16.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.16.0:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.17.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.17.0:*:*:*:*:*:*:*
-
cpe:2.3:a:tenable:tenable.sc:5.18.0:*:*:*:*:*:*:*
cpe:2.3:a:tenable:tenable.sc:5.18.0:*:*:*:*:*:*:*
CVSS3 Source
security@php.net
CVSS3 Type
Secondary
CVSS3 Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.