Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

debian логотип

CVE-2008-2829

больше 17 лет назад

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete ...

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2008-2829

больше 17 лет назад

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2008-2665

больше 17 лет назад

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2008-2666

больше 17 лет назад

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2008-2666

больше 17 лет назад

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier ...

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2008-2665

больше 17 лет назад

Directory traversal vulnerability in the posix_access function in PHP ...

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2008-2666

больше 17 лет назад

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2008-2665

больше 17 лет назад

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2008-2666

больше 17 лет назад

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

EPSS: Низкий
redhat логотип

CVE-2008-2665

больше 17 лет назад

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2008-2829

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete ...

CVSS2: 5
10%
Низкий
больше 17 лет назад
ubuntu логотип
CVE-2008-2829

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

CVSS2: 5
10%
Низкий
больше 17 лет назад
nvd логотип
CVE-2008-2665

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

CVSS2: 5
4%
Низкий
больше 17 лет назад
nvd логотип
CVE-2008-2666

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

CVSS2: 5
7%
Низкий
больше 17 лет назад
debian логотип
CVE-2008-2666

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier ...

CVSS2: 5
7%
Низкий
больше 17 лет назад
debian логотип
CVE-2008-2665

Directory traversal vulnerability in the posix_access function in PHP ...

CVSS2: 5
4%
Низкий
больше 17 лет назад
ubuntu логотип
CVE-2008-2666

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

CVSS2: 5
7%
Низкий
больше 17 лет назад
ubuntu логотип
CVE-2008-2665

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

CVSS2: 5
4%
Низкий
больше 17 лет назад
redhat логотип
CVE-2008-2666

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.

7%
Низкий
больше 17 лет назад
redhat логотип
CVE-2008-2665

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.

4%
Низкий
больше 17 лет назад

Уязвимостей на страницу


Поделиться