Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

debian логотип

CVE-2007-4033

больше 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/ ...

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2007-4033

больше 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2007-4010

больше 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-4010

больше 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disa ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-4010

больше 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

CVSS2: 6.8
EPSS: Низкий
redhat логотип

CVE-2007-4033

больше 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

EPSS: Средний
nvd логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to c ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2007-3799

больше 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2007-4033

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/ ...

CVSS2: 7.5
28%
Средний
больше 18 лет назад
ubuntu логотип
CVE-2007-4033

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

CVSS2: 7.5
28%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-4010

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

CVSS2: 6.8
4%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-4010

The win32std extension in PHP 5.2.3 does not follow safe_mode and disa ...

CVSS2: 6.8
4%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-4010

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

CVSS2: 6.8
4%
Низкий
больше 18 лет назад
redhat логотип
CVE-2007-4033

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

28%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to c ...

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3799

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
10%
Средний
больше 18 лет назад

Уязвимостей на страницу


Поделиться