Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 866

Количество 3 866

ubuntu логотип

CVE-2007-3294

около 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2007-3294

около 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

EPSS: Низкий
nvd логотип

CVE-2007-3294

около 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-3294

около 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension fo ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2007-3007

больше 18 лет назад

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2007-3007

больше 18 лет назад

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2007-3007

больше 18 лет назад

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode rest ...

CVSS2: 5
EPSS: Низкий
ubuntu логотип

CVE-2007-2872

больше 18 лет назад

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

CVSS2: 6.8
EPSS: Средний
redhat логотип

CVE-2007-2872

больше 18 лет назад

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

EPSS: Средний
nvd логотип

CVE-2007-2872

больше 18 лет назад

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-2872

больше 18 лет назад

Multiple integer overflows in the chunk_split function in PHP 5 before ...

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-2844

больше 18 лет назад

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.

CVSS2: 9.3
EPSS: Низкий
nvd логотип

CVE-2007-2844

больше 18 лет назад

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.

CVSS2: 9.3
EPSS: Низкий
debian логотип

CVE-2007-2844

больше 18 лет назад

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, ...

CVSS2: 9.3
EPSS: Низкий
ubuntu логотип

CVE-2007-2748

больше 18 лет назад

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2007-2748

больше 18 лет назад

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-2748

больше 18 лет назад

The substr_count function in PHP 5.2.1 and earlier allows context-depe ...

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2007-2728

больше 18 лет назад

The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. Note: The PHP team argue that this is not a valid security issue.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2007-2728

больше 18 лет назад

The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. Note: The PHP team argue that this is not a valid security issue.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2007-2728

больше 18 лет назад

The soap extension in PHP calls php_rand_r with an uninitialized seed ...

CVSS2: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
5%
Низкий
около 18 лет назад
redhat логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

5%
Низкий
около 18 лет назад
nvd логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
5%
Низкий
около 18 лет назад
debian логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension fo ...

CVSS2: 7.5
5%
Низкий
около 18 лет назад
ubuntu логотип
CVE-2007-3007

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
2%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3007

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
2%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3007

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode rest ...

CVSS2: 5
2%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-2872

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

CVSS2: 6.8
17%
Средний
больше 18 лет назад
redhat логотип
CVE-2007-2872

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

17%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-2872

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

CVSS2: 6.8
17%
Средний
больше 18 лет назад
debian логотип
CVE-2007-2872

Multiple integer overflows in the chunk_split function in PHP 5 before ...

CVSS2: 6.8
17%
Средний
больше 18 лет назад
ubuntu логотип
CVE-2007-2844

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.

CVSS2: 9.3
1%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-2844

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.

CVSS2: 9.3
1%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-2844

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, ...

CVSS2: 9.3
1%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-2748

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

CVSS2: 4.3
1%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-2748

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

CVSS2: 4.3
1%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-2748

The substr_count function in PHP 5.2.1 and earlier allows context-depe ...

CVSS2: 4.3
1%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-2728

The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. Note: The PHP team argue that this is not a valid security issue.

CVSS2: 5
1%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-2728

The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727. Note: The PHP team argue that this is not a valid security issue.

CVSS2: 5
1%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-2728

The soap extension in PHP calls php_rand_r with an uninitialized seed ...

CVSS2: 5
1%
Низкий
больше 18 лет назад

Уязвимостей на страницу