Debian Php7.4 vulnerabilities
64 known vulnerabilities affecting debian/php7.4.
Total CVEs
64
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH11MEDIUM32LOW16
Vulnerabilities
Page 4 of 4
CVE-2020-7059MEDIUMCVSS 6.5fixed in php7.4 7.4.2-7 (bullseye)2020
CVE-2020-7059 [MEDIUM] CVE-2020-7059: php7.4 - When using fgetss() function to read data with stripping tags, in PHP versions 7...
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
Scope: local
bullseye: resolved (fixed in 7.4.2-7)
debian
CVE-2020-7067LOWCVSS 7.5fixed in php7.4 7.4.5-1 (bullseye)2020
CVE-2020-7067 [HIGH] CVE-2020-7067: php7.4 - In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if...
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
Scope: local
bullseye: resolved (fixed in 7.4.5-1)
debian
CVE-2020-7061LOWCVSS 6.52020
CVE-2020-7061 [MEDIUM] CVE-2020-7061: php7.4 - In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR ...
In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR files on Windows using phar extension, certain content inside PHAR file could lead to one-byte read past the allocated buffer. This could potentially lead to information disclosure or crash.
Scope: local
bullseye: resolved
debian
CVE-2019-11048MEDIUMCVSS 5.3fixed in php7.4 7.4.9-1 (bullseye)2019
CVE-2019-11048 [MEDIUM] CVE-2019-11048: php7.4 - In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, wh...
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could
debian
← Previous4 / 4