Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 889

Количество 3 889

debian логотип

CVE-2007-1452

около 19 лет назад

The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement ...

CVSS2: 5
EPSS: Средний
ubuntu логотип

CVE-2007-1413

около 19 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2007-1413

около 19 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-2007-1413

около 19 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5 ...

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2007-1412

около 19 лет назад

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.

CVSS2: 7.8
EPSS: Низкий
nvd логотип

CVE-2007-1412

около 19 лет назад

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.

CVSS2: 7.8
EPSS: Низкий
debian логотип

CVE-2007-1412

около 19 лет назад

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 al ...

CVSS2: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1411

около 19 лет назад

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
EPSS: Средний
nvd логотип

CVE-2007-1411

около 19 лет назад

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2007-1411

около 19 лет назад

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versio ...

CVSS2: 6.8
EPSS: Средний
ubuntu логотип

CVE-2007-1401

около 19 лет назад

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
EPSS: Низкий
nvd логотип

CVE-2007-1401

около 19 лет назад

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
EPSS: Низкий
ubuntu логотип

CVE-2007-1396

около 19 лет назад

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2007-1396

около 19 лет назад

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2007-1396

около 19 лет назад

The import_request_variables function in PHP 4.0.7 through 4.4.6, and ...

CVSS2: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1383

около 19 лет назад

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2007-1383

около 19 лет назад

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2007-1383

около 19 лет назад

Integer overflow in the 16 bit variable reference counter in PHP 4 all ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2007-1381

около 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий
nvd логотип

CVE-2007-1381

около 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2007-1452

The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement ...

CVSS2: 5
10%
Средний
около 19 лет назад
ubuntu логотип
CVE-2007-1413

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

CVSS2: 7.5
16%
Средний
около 19 лет назад
nvd логотип
CVE-2007-1413

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

CVSS2: 7.5
16%
Средний
около 19 лет назад
debian логотип
CVE-2007-1413

Buffer overflow in the snmpget function in the snmp extension in PHP 5 ...

CVSS2: 7.5
16%
Средний
около 19 лет назад
ubuntu логотип
CVE-2007-1412

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.

CVSS2: 7.8
4%
Низкий
около 19 лет назад
nvd логотип
CVE-2007-1412

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.

CVSS2: 7.8
4%
Низкий
около 19 лет назад
debian логотип
CVE-2007-1412

The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 al ...

CVSS2: 7.8
4%
Низкий
около 19 лет назад
ubuntu логотип
CVE-2007-1411

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
15%
Средний
около 19 лет назад
nvd логотип
CVE-2007-1411

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

CVSS2: 6.8
15%
Средний
около 19 лет назад
debian логотип
CVE-2007-1411

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versio ...

CVSS2: 6.8
15%
Средний
около 19 лет назад
ubuntu логотип
CVE-2007-1401

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
0%
Низкий
около 19 лет назад
nvd логотип
CVE-2007-1401

Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.

CVSS2: 6.9
0%
Низкий
около 19 лет назад
ubuntu логотип
CVE-2007-1396

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
2%
Низкий
около 19 лет назад
nvd логотип
CVE-2007-1396

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

CVSS2: 6.8
2%
Низкий
около 19 лет назад
debian логотип
CVE-2007-1396

The import_request_variables function in PHP 4.0.7 through 4.4.6, and ...

CVSS2: 6.8
2%
Низкий
около 19 лет назад
ubuntu логотип
CVE-2007-1383

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
3%
Низкий
около 19 лет назад
nvd логотип
CVE-2007-1383

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.

CVSS3: 9.8
3%
Низкий
около 19 лет назад
debian логотип
CVE-2007-1383

Integer overflow in the 16 bit variable reference counter in PHP 4 all ...

CVSS3: 9.8
3%
Низкий
около 19 лет назад
ubuntu логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
около 19 лет назад
nvd логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
около 19 лет назад

Уязвимостей на страницу