Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.18.28.38.4202120222023202420252026202720282029

Недавние уязвимости PHP

Количество 3 867

ubuntu логотип

CVE-2007-0908

больше 18 лет назад

The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.

CVSS2: 5
EPSS: Средний
ubuntu логотип

CVE-2007-0905

больше 18 лет назад

PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2007-0455

почти 19 лет назад

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-0455

почти 19 лет назад

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Grap ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2007-0455

почти 19 лет назад

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2007-0455

почти 19 лет назад

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

EPSS: Низкий
redhat логотип

CVE-2006-7243

почти 19 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2006-6383

почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2006-6383

почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...

CVSS2: 4.6
EPSS: Низкий
ubuntu логотип

CVE-2006-6383

почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

CVSS2: 4.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2007-0908

The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.

CVSS2: 5
17%
Средний
больше 18 лет назад
ubuntu логотип
CVE-2007-0905

PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.

CVSS2: 7.5
1%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-0455

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

CVSS2: 7.5
5%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-0455

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Grap ...

CVSS2: 7.5
5%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-0455

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

CVSS2: 7.5
5%
Низкий
почти 19 лет назад
redhat логотип
CVE-2007-0455

Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.

5%
Низкий
почти 19 лет назад
redhat логотип
CVE-2006-7243

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVSS2: 4
2%
Низкий
почти 19 лет назад
nvd логотип
CVE-2006-6383

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

CVSS2: 4.6
0%
Низкий
почти 19 лет назад
debian логотип
CVE-2006-6383

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...

CVSS2: 4.6
0%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2006-6383

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

CVSS2: 4.6
0%
Низкий
почти 19 лет назад

Уязвимостей на страницу


Поделиться