Количество 3 863
Количество 3 863
CVE-2007-0906
Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause ...

CVE-2007-0905
PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.

CVE-2007-0905
PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.
CVE-2007-0905
PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir ...

CVE-2007-0448
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

CVE-2007-0448
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.
CVE-2007-0448
The fopen function in PHP 5.2.0 does not properly handle invalid URI h ...

CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might a ...

CVE-2006-7205
The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value.

CVE-2006-7205
The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value.
CVE-2006-7205
The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 ...

CVE-2006-7204
The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.

CVE-2006-7204
The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.
CVE-2006-7204
The imap_body function in PHP before 4.4.4 does not implement safemode ...

CVE-2006-6383
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

CVE-2006-6383
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
CVE-2006-6383
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2007-0906 Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause ... | CVSS2: 7.5 | 1% Низкий | больше 18 лет назад | |
![]() | CVE-2007-0905 PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383. | CVSS2: 7.5 | 1% Низкий | больше 18 лет назад |
![]() | CVE-2007-0905 PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383. | CVSS2: 7.5 | 1% Низкий | больше 18 лет назад |
CVE-2007-0905 PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir ... | CVSS2: 7.5 | 1% Низкий | больше 18 лет назад | |
![]() | CVE-2007-0448 The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI. | CVSS2: 10 | 2% Низкий | больше 18 лет назад |
![]() | CVE-2007-0448 The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI. | CVSS2: 10 | 2% Низкий | больше 18 лет назад |
CVE-2007-0448 The fopen function in PHP 5.2.0 does not properly handle invalid URI h ... | CVSS2: 10 | 2% Низкий | больше 18 лет назад | |
![]() | CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | CVSS2: 5 | 2% Низкий | больше 14 лет назад |
![]() | CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | CVSS2: 4 | 2% Низкий | больше 18 лет назад |
![]() | CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | CVSS2: 5 | 2% Низкий | больше 14 лет назад |
CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might a ... | CVSS2: 5 | 2% Низкий | больше 14 лет назад | |
![]() | CVE-2006-7205 The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value. | CVSS2: 5 | 1% Низкий | больше 18 лет назад |
![]() | CVE-2006-7205 The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value. | CVSS2: 5 | 1% Низкий | больше 18 лет назад |
CVE-2006-7205 The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 ... | CVSS2: 5 | 1% Низкий | больше 18 лет назад | |
![]() | CVE-2006-7204 The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents. | CVSS2: 2.1 | 0% Низкий | больше 18 лет назад |
![]() | CVE-2006-7204 The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents. | CVSS2: 2.1 | 0% Низкий | больше 18 лет назад |
CVE-2006-7204 The imap_body function in PHP before 4.4.4 does not implement safemode ... | CVSS2: 2.1 | 0% Низкий | больше 18 лет назад | |
![]() | CVE-2006-6383 PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path. | CVSS2: 4.6 | 0% Низкий | больше 18 лет назад |
![]() | CVE-2006-6383 PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path. | CVSS2: 4.6 | 0% Низкий | больше 18 лет назад |
CVE-2006-6383 PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ... | CVSS2: 4.6 | 0% Низкий | больше 18 лет назад |
Уязвимостей на страницу