Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 883

github логотип

GHSA-7cpc-xrrr-8qwm

почти 4 года назад

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.

EPSS: Низкий
github логотип

GHSA-7pf5-hfgr-ch72

почти 4 года назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS: Низкий
github логотип

GHSA-j2hw-525w-j8q2

почти 4 года назад

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

EPSS: Низкий
github логотип

GHSA-2f2v-rgmc-w6fp

почти 4 года назад

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables.

EPSS: Низкий
github логотип

GHSA-qq3m-73fj-v56q

почти 4 года назад

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

EPSS: Низкий
github логотип

GHSA-r5ff-p26w-7pfj

почти 4 года назад

php.cgi allows attackers to read any file on the system.

EPSS: Низкий
github логотип

GHSA-j2h3-fmf6-5vc4

почти 4 года назад

CGI PHP mylog script allows an attacker to read any file on the target server.

EPSS: Низкий
github логотип

GHSA-pc5g-vf3f-w3r7

почти 4 года назад

Buffer overflow in PHP cgi program, php.cgi allows shell access.

EPSS: Низкий
github логотип

GHSA-5h5w-vq2m-cxf3

почти 4 года назад

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

EPSS: Низкий
github логотип

GHSA-h3x9-2c56-jqm5

почти 4 года назад

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-7cpc-xrrr-8qwm

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.

1%
Низкий
почти 4 года назад
github логотип
GHSA-7pf5-hfgr-ch72

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

5%
Низкий
почти 4 года назад
github логотип
GHSA-j2hw-525w-j8q2

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

0%
Низкий
почти 4 года назад
github логотип
GHSA-2f2v-rgmc-w6fp

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables.

1%
Низкий
почти 4 года назад
github логотип
GHSA-qq3m-73fj-v56q

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

3%
Низкий
почти 4 года назад
github логотип
GHSA-r5ff-p26w-7pfj

php.cgi allows attackers to read any file on the system.

2%
Низкий
почти 4 года назад
github логотип
GHSA-j2h3-fmf6-5vc4

CGI PHP mylog script allows an attacker to read any file on the target server.

3%
Низкий
почти 4 года назад
github логотип
GHSA-pc5g-vf3f-w3r7

Buffer overflow in PHP cgi program, php.cgi allows shell access.

1%
Низкий
почти 4 года назад
github логотип
GHSA-5h5w-vq2m-cxf3

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

8%
Низкий
почти 4 года назад
github логотип
GHSA-h3x9-2c56-jqm5

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

2%
Низкий
почти 4 года назад

Уязвимостей на страницу


Поделиться