Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 883

Количество 3 883

ubuntu логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
EPSS: Средний
redhat логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

EPSS: Средний
nvd логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-1711

почти 19 лет назад

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 a ...

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1710

почти 19 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2007-1710

почти 19 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-1710

почти 19 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2007-1709

почти 19 лет назад

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
EPSS: Средний
redhat логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

EPSS: Средний
nvd логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-1701

почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-1700

почти 19 лет назад

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, c ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2007-1649

почти 19 лет назад

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.

CVSS2: 7.8
EPSS: Низкий
nvd логотип

CVE-2007-1649

почти 19 лет назад

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.

CVSS2: 7.8
EPSS: Низкий
debian логотип

CVE-2007-1649

почти 19 лет назад

PHP 5.2.1 allows context-dependent attackers to read portions of heap ...

CVSS2: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1584

почти 19 лет назад

Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2007-1584

почти 19 лет назад

Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.

CVSS2: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
14%
Средний
почти 19 лет назад
redhat логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

14%
Средний
почти 19 лет назад
nvd логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

CVSS2: 6.8
14%
Средний
почти 19 лет назад
debian логотип
CVE-2007-1711

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 a ...

CVSS2: 6.8
14%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1710

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
0%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1710

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

CVSS2: 4.3
0%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1710

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

CVSS2: 4.3
0%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1709

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.

CVSS2: 4.3
1%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
11%
Средний
почти 19 лет назад
redhat логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

11%
Средний
почти 19 лет назад
nvd логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

CVSS2: 6.8
11%
Средний
почти 19 лет назад
debian логотип
CVE-2007-1701

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

CVSS2: 6.8
11%
Средний
почти 19 лет назад
ubuntu логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
4%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

CVSS2: 7.5
4%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1700

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, c ...

CVSS2: 7.5
4%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-1649

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.

CVSS2: 7.8
7%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1649

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.

CVSS2: 7.8
7%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1649

PHP 5.2.1 allows context-dependent attackers to read portions of heap ...

CVSS2: 7.8
7%
Низкий
почти 19 лет назад
ubuntu логотип
CVE-2007-1584

Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.

CVSS2: 6.8
3%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1584

Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.

CVSS2: 6.8
3%
Низкий
почти 19 лет назад

Уязвимостей на страницу