Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.18.28.38.4202120222023202420252026202720282029

Недавние уязвимости PHP

Количество 3 867

fstec логотип

BDU:2018-00525

больше 7 лет назад

Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2018:0538-1

больше 7 лет назад

Security update for php5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0530-1

больше 7 лет назад

Security update for php5

EPSS: Низкий
redhat логотип

CVE-2018-7584

больше 7 лет назад

In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.

CVSS3: 5.9
EPSS: Высокий
nvd логотип

CVE-2015-9253

больше 7 лет назад

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2015-9253

больше 7 лет назад

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2015-9253

больше 7 лет назад

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2016-10712

почти 8 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-10712

почти 8 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all o ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2016-10712

почти 8 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2018-00525

Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
75%
Высокий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0538-1

Security update for php5

1%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0530-1

Security update for php5

1%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-7584

In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.

CVSS3: 5.9
75%
Высокий
больше 7 лет назад
nvd логотип
CVE-2015-9253

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2015-9253

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before ...

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2015-9253

An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.

CVSS3: 6.5
1%
Низкий
больше 7 лет назад
nvd логотип
CVE-2016-10712

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2016-10712

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all o ...

CVSS3: 7.5
1%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2016-10712

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
1%
Низкий
почти 8 лет назад

Уязвимостей на страницу


Поделиться