Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.18.28.38.4202120222023202420252026202720282029

Недавние уязвимости PHP

Количество 3 867

github логотип

GHSA-3hrc-69x2-hp5x

больше 3 лет назад

Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements.

EPSS: Низкий
github логотип

GHSA-mjm4-4qrp-fpmr

больше 3 лет назад

PHP 4.0 through 4.1.1 stores session IDs in temporary files whose name contains the session ID, which allows local users to hijack web connections.

EPSS: Низкий
github логотип

GHSA-cp2r-h7c2-j66v

больше 3 лет назад

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.

EPSS: Средний
github логотип

GHSA-3rrg-mmq3-p43v

больше 3 лет назад

The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.

EPSS: Низкий
github логотип

GHSA-7cpc-xrrr-8qwm

больше 3 лет назад

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.

EPSS: Низкий
github логотип

GHSA-7pf5-hfgr-ch72

больше 3 лет назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS: Низкий
github логотип

GHSA-j2hw-525w-j8q2

больше 3 лет назад

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

EPSS: Низкий
github логотип

GHSA-2f2v-rgmc-w6fp

больше 3 лет назад

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables.

EPSS: Низкий
github логотип

GHSA-qq3m-73fj-v56q

больше 3 лет назад

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

EPSS: Низкий
github логотип

GHSA-r5ff-p26w-7pfj

больше 3 лет назад

php.cgi allows attackers to read any file on the system.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-3hrc-69x2-hp5x

Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements.

5%
Низкий
больше 3 лет назад
github логотип
GHSA-mjm4-4qrp-fpmr

PHP 4.0 through 4.1.1 stores session IDs in temporary files whose name contains the session ID, which allows local users to hijack web connections.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-cp2r-h7c2-j66v

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.

59%
Средний
больше 3 лет назад
github логотип
GHSA-3rrg-mmq3-p43v

The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7cpc-xrrr-8qwm

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7pf5-hfgr-ch72

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

5%
Низкий
больше 3 лет назад
github логотип
GHSA-j2hw-525w-j8q2

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-2f2v-rgmc-w6fp

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-qq3m-73fj-v56q

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-r5ff-p26w-7pfj

php.cgi allows attackers to read any file on the system.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться