Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 883

Количество 3 883

github логотип

GHSA-jhxw-fqxp-j75j

почти 4 года назад

The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jh35-xrpp-vv4q

почти 4 года назад

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

EPSS: Низкий
github логотип

GHSA-jfqj-32j4-84v2

почти 4 года назад

The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.

EPSS: Низкий
github логотип

GHSA-jfc6-9gw3-fhfg

больше 3 лет назад

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-j942-443j-vqgr

почти 4 года назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

EPSS: Средний
github логотип

GHSA-j7wp-2pxv-m6g9

почти 4 года назад

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

EPSS: Низкий
github логотип

GHSA-j7jp-rgph-7546

почти 4 года назад

The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.

EPSS: Низкий
github логотип

GHSA-j77m-rxfm-wq7p

больше 3 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

EPSS: Низкий
github логотип

GHSA-j5j6-54xj-x4jx

больше 3 лет назад

acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.

EPSS: Низкий
github логотип

GHSA-j4qg-8m5f-3hcv

больше 3 лет назад

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.

EPSS: Средний
github логотип

GHSA-j466-8vvm-x7cw

почти 4 года назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

EPSS: Низкий
github логотип

GHSA-j37w-6rpq-mqqx

почти 4 года назад

The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.

EPSS: Низкий
github логотип

GHSA-j2xj-f75j-96w3

больше 3 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-j2mg-c55m-5q6x

больше 3 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

EPSS: Низкий
github логотип

GHSA-j2hw-525w-j8q2

почти 4 года назад

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

EPSS: Низкий
github логотип

GHSA-j2h3-fmf6-5vc4

почти 4 года назад

CGI PHP mylog script allows an attacker to read any file on the target server.

EPSS: Низкий
github логотип

GHSA-j29m-6pgw-53qh

больше 3 лет назад

Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

EPSS: Средний
github логотип

GHSA-hxx4-229m-wgjj

почти 4 года назад

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

EPSS: Низкий
github логотип

GHSA-hrwm-9436-5mv3

7 месяцев назад

pgsql extension does not check for errors during escaping

EPSS: Низкий
github логотип

GHSA-hrfw-px9c-c3f5

больше 3 лет назад

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-jhxw-fqxp-j75j

The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.

CVSS3: 7.5
9%
Низкий
почти 4 года назад
github логотип
GHSA-jh35-xrpp-vv4q

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

0%
Низкий
почти 4 года назад
github логотип
GHSA-jfqj-32j4-84v2

The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.

0%
Низкий
почти 4 года назад
github логотип
GHSA-jfc6-9gw3-fhfg

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.

CVSS3: 8.8
12%
Средний
больше 3 лет назад
github логотип
GHSA-j942-443j-vqgr

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

16%
Средний
почти 4 года назад
github логотип
GHSA-j7wp-2pxv-m6g9

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.

10%
Низкий
почти 4 года назад
github логотип
GHSA-j7jp-rgph-7546

The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.

0%
Низкий
почти 4 года назад
github логотип
GHSA-j77m-rxfm-wq7p

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-j5j6-54xj-x4jx

acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-j4qg-8m5f-3hcv

The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.

31%
Средний
больше 3 лет назад
github логотип
GHSA-j466-8vvm-x7cw

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

3%
Низкий
почти 4 года назад
github логотип
GHSA-j37w-6rpq-mqqx

The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.

0%
Низкий
почти 4 года назад
github логотип
GHSA-j2xj-f75j-96w3

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
11%
Средний
больше 3 лет назад
github логотип
GHSA-j2mg-c55m-5q6x

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-j2hw-525w-j8q2

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.

0%
Низкий
почти 4 года назад
github логотип
GHSA-j2h3-fmf6-5vc4

CGI PHP mylog script allows an attacker to read any file on the target server.

3%
Низкий
почти 4 года назад
github логотип
GHSA-j29m-6pgw-53qh

Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

16%
Средний
больше 3 лет назад
github логотип
GHSA-hxx4-229m-wgjj

The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.

1%
Низкий
почти 4 года назад
github логотип
GHSA-hrwm-9436-5mv3

pgsql extension does not check for errors during escaping

0%
Низкий
7 месяцев назад
github логотип
GHSA-hrfw-px9c-c3f5

The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.

CVSS3: 7.3
3%
Низкий
больше 3 лет назад

Уязвимостей на страницу