PHP — популярный язык сценариев общего назначения, особенно подходящий для веб-разработки.
Релизный цикл, информация об уязвимостях
График релизов
Количество 3 883
CVE-2015-6836
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
CVE-2015-6836
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...
CVE-2015-6833
Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
CVE-2015-6833
Directory traversal vulnerability in the PharData class in PHP before ...
CVE-2015-6832
Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
CVE-2015-6832
Use-after-free vulnerability in the SPL unserialize implementation in ...
CVE-2015-6831
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
CVE-2015-6831
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5 ...
CVE-2015-6527
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
CVE-2015-6527
The php_str_replace_in_subject function in ext/standard/string.c in PH ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
CVE-2015-6836 The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function. | CVSS3: 7.3 | 3% Низкий | около 10 лет назад | |
CVE-2015-6836 The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ... | CVSS3: 7.3 | 3% Низкий | около 10 лет назад | |
CVE-2015-6833 Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call. | CVSS3: 7.5 | 0% Низкий | около 10 лет назад | |
CVE-2015-6833 Directory traversal vulnerability in the PharData class in PHP before ... | CVSS3: 7.5 | 0% Низкий | около 10 лет назад | |
CVE-2015-6832 Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field. | CVSS3: 7.3 | 2% Низкий | около 10 лет назад | |
CVE-2015-6832 Use-after-free vulnerability in the SPL unserialize implementation in ... | CVSS3: 7.3 | 2% Низкий | около 10 лет назад | |
CVE-2015-6831 Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. | CVSS3: 7.3 | 1% Низкий | около 10 лет назад | |
CVE-2015-6831 Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5 ... | CVSS3: 7.3 | 1% Низкий | около 10 лет назад | |
CVE-2015-6527 The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function. | CVSS3: 7.3 | 3% Низкий | около 10 лет назад | |
CVE-2015-6527 The php_str_replace_in_subject function in ext/standard/string.c in PH ... | CVSS3: 7.3 | 3% Низкий | около 10 лет назад |
Уязвимостей на страницу