Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

debian логотип

CVE-2007-1383

почти 19 лет назад

Integer overflow in the 16 bit variable reference counter in PHP 4 all ...

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2007-1378

почти 19 лет назад

The ovrimos_longreadlen function in the Ovrimos extension for PHP befo ...

CVSS2: 5.1
EPSS: Низкий
debian логотип

CVE-2007-1381

почти 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10 ...

CVSS2: 7.6
EPSS: Низкий
debian логотип

CVE-2007-1375

почти 19 лет назад

Integer overflow in the substr_compare function in PHP 5.2.1 and earli ...

CVSS2: 5
EPSS: Средний
debian логотип

CVE-2007-1379

почти 19 лет назад

The ovrimos_close function in the Ovrimos extension for PHP before 4.4 ...

CVSS2: 5.1
EPSS: Низкий
debian логотип

CVE-2007-1376

почти 19 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x s ...

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2007-1376

почти 19 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2007-1381

почти 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий
ubuntu логотип

CVE-2007-1380

почти 19 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

CVSS2: 5
EPSS: Средний
ubuntu логотип

CVE-2007-1383

почти 19 лет назад

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2007-1383

Integer overflow in the 16 bit variable reference counter in PHP 4 all ...

CVSS3: 9.8
3%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1378

The ovrimos_longreadlen function in the Ovrimos extension for PHP befo ...

CVSS2: 5.1
1%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10 ...

CVSS2: 7.6
5%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1375

Integer overflow in the substr_compare function in PHP 5.2.1 and earli ...

CVSS2: 5
15%
Средний
почти 19 лет назад
debian логотип
CVE-2007-1379

The ovrimos_close function in the Ovrimos extension for PHP before 4.4 ...

CVSS2: 5.1
1%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1376

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x s ...

CVSS2: 7.5
14%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1376

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

CVSS2: 7.5
14%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-1380

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

CVSS2: 5
13%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1383

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
3%
Низкий
почти 19 лет назад

Уязвимостей на страницу


Поделиться