Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"
PHP

PHPпопулярный язык сценариев общего назначения, особенно подходящий для веб-разработки.

Релизный цикл, информация об уязвимостях

Продукт: PHP
Вендор: php

График релизов

8.28.38.48.5202220232024202520262027202820292030

Недавние уязвимости PHP

Количество 3 889

github логотип

GHSA-qq3m-73fj-v56q

почти 4 года назад

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

EPSS: Низкий
github логотип

GHSA-r5ff-p26w-7pfj

почти 4 года назад

php.cgi allows attackers to read any file on the system.

EPSS: Низкий
github логотип

GHSA-j2h3-fmf6-5vc4

почти 4 года назад

CGI PHP mylog script allows an attacker to read any file on the target server.

EPSS: Низкий
github логотип

GHSA-pc5g-vf3f-w3r7

почти 4 года назад

Buffer overflow in PHP cgi program, php.cgi allows shell access.

EPSS: Низкий
github логотип

GHSA-5h5w-vq2m-cxf3

почти 4 года назад

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

EPSS: Низкий
github логотип

GHSA-h3x9-2c56-jqm5

почти 4 года назад

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

EPSS: Низкий
github логотип

GHSA-vhmx-6whg-m8hv

почти 4 года назад

Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.

EPSS: Низкий
github логотип

GHSA-8w9g-f9jw-3mqv

почти 4 года назад

PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

EPSS: Низкий
github логотип

GHSA-8xg9-g9f5-rcr7

почти 4 года назад

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.

EPSS: Низкий
github логотип

GHSA-h7q9-pqp4-r828

почти 4 года назад

The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-qq3m-73fj-v56q

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

3%
Низкий
почти 4 года назад
github логотип
GHSA-r5ff-p26w-7pfj

php.cgi allows attackers to read any file on the system.

2%
Низкий
почти 4 года назад
github логотип
GHSA-j2h3-fmf6-5vc4

CGI PHP mylog script allows an attacker to read any file on the target server.

3%
Низкий
почти 4 года назад
github логотип
GHSA-pc5g-vf3f-w3r7

Buffer overflow in PHP cgi program, php.cgi allows shell access.

1%
Низкий
почти 4 года назад
github логотип
GHSA-5h5w-vq2m-cxf3

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

8%
Низкий
почти 4 года назад
github логотип
GHSA-h3x9-2c56-jqm5

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

2%
Низкий
почти 4 года назад
github логотип
GHSA-vhmx-6whg-m8hv

Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.

7%
Низкий
почти 4 года назад
github логотип
GHSA-8w9g-f9jw-3mqv

PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

2%
Низкий
почти 4 года назад
github логотип
GHSA-8xg9-g9f5-rcr7

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.

7%
Низкий
почти 4 года назад
github логотип
GHSA-h7q9-pqp4-r828

The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

10%
Средний
почти 4 года назад

Уязвимостей на страницу


Поделиться