Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.18.28.38.4202120222023202420252026202720282029

Недавние уязвимости PHP

Количество 3 867

nvd логотип

CVE-2018-19520

почти 7 лет назад

An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2018-19518

почти 7 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2018-19518

почти 7 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_o ...

CVSS3: 7.5
EPSS: Критический
ubuntu логотип

CVE-2018-19518

почти 7 лет назад

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 7.5
EPSS: Критический
fstec логотип

BDU:2022-02427

почти 7 лет назад

Уязвимость CMS-системы SDCMS, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный PHP-код

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2018-19396

почти 7 лет назад

ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-19396

почти 7 лет назад

ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attac ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2018-19395

почти 7 лет назад

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-19395

почти 7 лет назад

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attacke ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2018-19395

почти 7 лет назад

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2018-19520

An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.

CVSS3: 8.8
1%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-19518

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 7.5
94%
Критический
почти 7 лет назад
debian логотип
CVE-2018-19518

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_o ...

CVSS3: 7.5
94%
Критический
почти 7 лет назад
ubuntu логотип
CVE-2018-19518

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

CVSS3: 7.5
94%
Критический
почти 7 лет назад
fstec логотип
BDU:2022-02427

Уязвимость CMS-системы SDCMS, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный PHP-код

CVSS3: 8.8
1%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-19396

ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-19396

ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attac ...

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-19395

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-19395

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attacke ...

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
ubuntu логотип
CVE-2018-19395

ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").

CVSS3: 7.5
1%
Низкий
почти 7 лет назад

Уязвимостей на страницу


Поделиться