Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-7071
Description:In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
Test IDs: 1.3.6.1.4.1.25623.1.1.10.2021.0025   1.3.6.1.4.1.25623.1.0.878815   1.3.6.1.4.1.25623.1.0.145115   1.3.6.1.4.1.25623.1.1.2.2021.1163   1.3.6.1.4.1.25623.1.1.4.2021.0126.1   1.3.6.1.4.1.25623.1.0.853634   1.3.6.1.4.1.25623.1.0.892708   1.3.6.1.4.1.25623.1.1.4.2021.0125.1   1.3.6.1.4.1.25623.1.0.878809   1.3.6.1.4.1.25623.1.1.4.2021.0124.1   1.3.6.1.4.1.25623.1.0.853653   1.3.6.1.4.1.25623.1.0.145114  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-7071
https://security.netapp.com/advisory/ntap-20210312-0005/
https://www.tenable.com/security/tns-2021-14
Debian Security Information: DSA-4856 (Google Search)
https://www.debian.org/security/2021/dsa-4856
https://security.gentoo.org/glsa/202105-23
https://bugs.php.net/bug.php?id=77423
https://bugs.php.net/bug.php?id=77423
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html




© 1998-2025 E-Soft Inc. All rights reserved.