Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

suse-cvrf логотип

SUSE-SU-2017:0899-1

почти 9 лет назад

Security update for php7

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0850-1

почти 9 лет назад

Security update for php5

EPSS: Низкий
nvd логотип

CVE-2017-7272

почти 9 лет назад

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2017-7272

почти 9 лет назад

PHP through 7.1.11 enables potential SSRF in applications that accept ...

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2017-7272

почти 9 лет назад

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2017-7272

почти 9 лет назад

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2023-01643

почти 9 лет назад

Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0761-1

почти 9 лет назад

Security update for php5

EPSS: Низкий
nvd логотип

CVE-2015-8994

почти 9 лет назад

An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these s

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2015-8994

почти 9 лет назад

An issue was discovered in PHP 5.x and 7.x, when the configuration use ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2017:0899-1

Security update for php7

2%
Низкий
почти 9 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0850-1

Security update for php5

2%
Низкий
почти 9 лет назад
nvd логотип
CVE-2017-7272

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 7.4
1%
Низкий
почти 9 лет назад
debian логотип
CVE-2017-7272

PHP through 7.1.11 enables potential SSRF in applications that accept ...

CVSS3: 7.4
1%
Низкий
почти 9 лет назад
ubuntu логотип
CVE-2017-7272

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 7.4
1%
Низкий
почти 9 лет назад
redhat логотип
CVE-2017-7272

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

CVSS3: 5.4
1%
Низкий
почти 9 лет назад
fstec логотип
BDU:2023-01643

Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
1%
Низкий
почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2017:0761-1

Security update for php5

2%
Низкий
почти 9 лет назад
nvd логотип
CVE-2015-8994

An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these s

CVSS3: 7.5
2%
Низкий
почти 9 лет назад
debian логотип
CVE-2015-8994

An issue was discovered in PHP 5.x and 7.x, when the configuration use ...

CVSS3: 7.5
2%
Низкий
почти 9 лет назад

Уязвимостей на страницу


Поделиться