Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.18.28.38.4202120222023202420252026202720282029

Недавние уязвимости PHP

Количество 3 768

debian логотип

CVE-2007-1399

больше 18 лет назад

Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8. ...

CVSS2: 10
EPSS: Средний
debian логотип

CVE-2007-1411

больше 18 лет назад

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versio ...

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-1396

больше 18 лет назад

The import_request_variables function in PHP 4.0.7 through 4.4.6, and ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1396

больше 18 лет назад

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1399

больше 18 лет назад

Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.

CVSS2: 10
EPSS: Средний
ubuntu логотип

CVE-2007-1401

больше 18 лет назад

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
EPSS: Низкий
ubuntu логотип

CVE-2007-1411

больше 18 лет назад

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
EPSS: Средний
nvd логотип

CVE-2007-1375

больше 18 лет назад

Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2007-1378

больше 18 лет назад

The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments.

CVSS2: 5.1
EPSS: Низкий
nvd логотип

CVE-2007-1381

больше 18 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2007-1399

Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8. ...

CVSS2: 10
30%
Средний
больше 18 лет назад
debian логотип
CVE-2007-1411

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versio ...

CVSS2: 6.8
11%
Средний
больше 18 лет назад
debian логотип
CVE-2007-1396

The import_request_variables function in PHP 4.0.7 through 4.4.6, and ...

CVSS2: 6.8
2%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-1396

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
2%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-1399

Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.

CVSS2: 10
30%
Средний
больше 18 лет назад
ubuntu логотип
CVE-2007-1401

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
0%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-1411

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
11%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-1375

Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.

CVSS2: 5
15%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-1378

The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments.

CVSS2: 5.1
1%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
больше 18 лет назад

Уязвимостей на страницу


Поделиться