Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

nvd логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2007-1709

почти 19 лет назад

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-1710

почти 19 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 a ...

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, c ...

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1710

почти 19 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
4%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1709

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.

CVSS2: 4.3
1%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1710

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

CVSS2: 4.3
0%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 a ...

CVSS2: 6.8
14%
Средний
почти 19 лет назад
debian логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, c ...

CVSS2: 7.5
4%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

CVSS2: 6.8
11%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
11%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
14%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1710

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
0%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
4%
Низкий
почти 19 лет назад

Уязвимостей на страницу


Поделиться