Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 883

Количество 3 883

nvd логотип

CVE-2007-3996

больше 18 лет назад

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-3996

больше 18 лет назад

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote a ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-3806

больше 18 лет назад

The glob function in PHP 5.2.3 allows context-dependent attackers to c ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-3799

больше 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
EPSS: Средний
redhat логотип

CVE-2007-3799

больше 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

EPSS: Средний
nvd логотип

CVE-2007-3799

больше 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
EPSS: Средний
debian логотип

CVE-2007-3799

больше 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5 ...

CVSS2: 4.3
EPSS: Средний
ubuntu логотип

CVE-2007-3790

больше 18 лет назад

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2007-3790

больше 18 лет назад

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2007-3790

больше 18 лет назад

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allo ...

CVSS2: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2007-3378

больше 18 лет назад

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2007-3378

больше 18 лет назад

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-3378

больше 18 лет назад

The (1) session_save_path, (2) ini_set, and (3) error_log functions in ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-3294

больше 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2007-3294

больше 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

EPSS: Низкий
nvd логотип

CVE-2007-3294

больше 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-3294

больше 18 лет назад

Multiple buffer overflows in libtidy, as used in the Tidy extension fo ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2007-3007

больше 18 лет назад

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-3996

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

CVSS2: 6.8
10%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3996

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote a ...

CVSS2: 6.8
10%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3806

The glob function in PHP 5.2.3 allows context-dependent attackers to c ...

CVSS2: 6.8
6%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3799

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
10%
Средний
больше 18 лет назад
redhat логотип
CVE-2007-3799

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

10%
Средний
больше 18 лет назад
nvd логотип
CVE-2007-3799

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

CVSS2: 4.3
10%
Средний
больше 18 лет назад
debian логотип
CVE-2007-3799

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5 ...

CVSS2: 4.3
10%
Средний
больше 18 лет назад
ubuntu логотип
CVE-2007-3790

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

CVSS2: 5.8
6%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3790

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

CVSS2: 5.8
6%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3790

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allo ...

CVSS2: 5.8
6%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3378

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.

CVSS2: 6.8
3%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3378

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.

CVSS2: 6.8
3%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3378

The (1) session_save_path, (2) ini_set, and (3) error_log functions in ...

CVSS2: 6.8
3%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
7%
Низкий
больше 18 лет назад
redhat логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

7%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function. NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.

CVSS2: 7.5
7%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3294

Multiple buffer overflows in libtidy, as used in the Tidy extension fo ...

CVSS2: 7.5
7%
Низкий
больше 18 лет назад
ubuntu логотип
CVE-2007-3007

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

CVSS2: 5
1%
Низкий
больше 18 лет назад

Уязвимостей на страницу