Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 843

Количество 3 843

github логотип

GHSA-j942-443j-vqgr

больше 3 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

EPSS: Средний
github логотип

GHSA-j7wp-2pxv-m6g9

больше 3 лет назад

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

EPSS: Низкий
github логотип

GHSA-j7jp-rgph-7546

больше 3 лет назад

The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.

EPSS: Низкий
github логотип

GHSA-j77m-rxfm-wq7p

около 3 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

EPSS: Низкий
github логотип

GHSA-j5j6-54xj-x4jx

около 3 лет назад

acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.

EPSS: Низкий
github логотип

GHSA-j4qg-8m5f-3hcv

больше 3 лет назад

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.

EPSS: Низкий
github логотип

GHSA-j466-8vvm-x7cw

больше 3 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

EPSS: Низкий
github логотип

GHSA-j37w-6rpq-mqqx

больше 3 лет назад

The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.

EPSS: Низкий
github логотип

GHSA-j2xj-f75j-96w3

больше 3 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-j2mg-c55m-5q6x

около 3 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

EPSS: Низкий
github логотип

GHSA-j2hw-525w-j8q2

больше 3 лет назад

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

EPSS: Низкий
github логотип

GHSA-j2h3-fmf6-5vc4

больше 3 лет назад

CGI PHP mylog script allows an attacker to read any file on the target server.

EPSS: Низкий
github логотип

GHSA-j29m-6pgw-53qh

больше 3 лет назад

Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

EPSS: Низкий
github логотип

GHSA-hxx4-229m-wgjj

больше 3 лет назад

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

EPSS: Низкий
github логотип

GHSA-hrwm-9436-5mv3

около 1 месяца назад

pgsql extension does not check for errors during escaping

EPSS: Низкий
github логотип

GHSA-hrfw-px9c-c3f5

около 3 лет назад

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-hqmf-7qgf-8qgx

больше 3 лет назад

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

EPSS: Низкий
github логотип

GHSA-hpv6-fw9f-6844

больше 3 лет назад

php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments.

EPSS: Низкий
github логотип

GHSA-hp65-4pq5-qqw7

около 3 лет назад

Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.

EPSS: Средний
github логотип

GHSA-hp4x-jx54-qxcp

больше 3 лет назад

The Foreign Function Interface (ffi) extension in PHP 5.0.5 does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code by loading an arbitrary DLL and calling a function, as demonstrated by kernel32.dll and the WinExec function. NOTE: this issue does not cross privilege boundaries in most contexts, so perhaps it should not be included in CVE.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-j942-443j-vqgr

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

22%
Средний
больше 3 лет назад
github логотип
GHSA-j7wp-2pxv-m6g9

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

7%
Низкий
больше 3 лет назад
github логотип
GHSA-j7jp-rgph-7546

The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-j77m-rxfm-wq7p

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

1%
Низкий
около 3 лет назад
github логотип
GHSA-j5j6-54xj-x4jx

acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.

0%
Низкий
около 3 лет назад
github логотип
GHSA-j4qg-8m5f-3hcv

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.

8%
Низкий
больше 3 лет назад
github логотип
GHSA-j466-8vvm-x7cw

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-j37w-6rpq-mqqx

The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-j2xj-f75j-96w3

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
5%
Низкий
больше 3 лет назад
github логотип
GHSA-j2mg-c55m-5q6x

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

0%
Низкий
около 3 лет назад
github логотип
GHSA-j2hw-525w-j8q2

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-j2h3-fmf6-5vc4

CGI PHP mylog script allows an attacker to read any file on the target server.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-j29m-6pgw-53qh

Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

4%
Низкий
больше 3 лет назад
github логотип
GHSA-hxx4-229m-wgjj

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-hrwm-9436-5mv3

pgsql extension does not check for errors during escaping

0%
Низкий
около 1 месяца назад
github логотип
GHSA-hrfw-px9c-c3f5

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

CVSS3: 7.3
2%
Низкий
около 3 лет назад
github логотип
GHSA-hqmf-7qgf-8qgx

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-hpv6-fw9f-6844

php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments.

4%
Низкий
больше 3 лет назад
github логотип
GHSA-hp65-4pq5-qqw7

Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.

61%
Средний
около 3 лет назад
github логотип
GHSA-hp4x-jx54-qxcp

The Foreign Function Interface (ffi) extension in PHP 5.0.5 does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code by loading an arbitrary DLL and calling a function, as demonstrated by kernel32.dll and the WinExec function. NOTE: this issue does not cross privilege boundaries in most contexts, so perhaps it should not be included in CVE.

3%
Низкий
больше 3 лет назад

Уязвимостей на страницу