Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 889

ubuntu логотип

CVE-2008-5658

больше 17 лет назад

Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2008-5625

больше 17 лет назад

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-2008-5625

больше 17 лет назад

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictio ...

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2008-5624

больше 17 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2008-5624

больше 17 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_ ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2008-5625

больше 17 лет назад

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2008-5624

больше 17 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2008-5844

больше 17 лет назад

PHP 5.2.7 contains an incorrect change to the FILTER_UNSAFE_RAW functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct SQL injection attacks and unspecified other attacks.

EPSS: Низкий
redhat логотип

CVE-2008-5658

больше 17 лет назад

Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.

EPSS: Низкий
redhat логотип

CVE-2008-5624

больше 17 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2008-5658

Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.

CVSS2: 7.5
2%
Низкий
больше 17 лет назад
nvd логотип
CVE-2008-5625

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.

CVSS2: 7.5
11%
Средний
больше 17 лет назад
debian логотип
CVE-2008-5625

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictio ...

CVSS2: 7.5
11%
Средний
больше 17 лет назад
nvd логотип
CVE-2008-5624

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

CVSS2: 7.5
2%
Низкий
больше 17 лет назад
debian логотип
CVE-2008-5624

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_ ...

CVSS2: 7.5
2%
Низкий
больше 17 лет назад
ubuntu логотип
CVE-2008-5625

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.

CVSS2: 7.5
11%
Средний
больше 17 лет назад
ubuntu логотип
CVE-2008-5624

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

CVSS2: 7.5
2%
Низкий
больше 17 лет назад
redhat логотип
CVE-2008-5844

PHP 5.2.7 contains an incorrect change to the FILTER_UNSAFE_RAW functionality, and unintentionally disables magic_quotes_gpc regardless of the actual magic_quotes_gpc setting, which might make it easier for context-dependent attackers to conduct SQL injection attacks and unspecified other attacks.

0%
Низкий
больше 17 лет назад
redhat логотип
CVE-2008-5658

Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.

2%
Низкий
больше 17 лет назад
redhat логотип
CVE-2008-5624

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

2%
Низкий
больше 17 лет назад

Уязвимостей на страницу


Поделиться