Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 883

Количество 3 883

github логотип

GHSA-5jqx-3p4m-wv4h

больше 3 лет назад

Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-5jh5-7283-3xvx

больше 3 лет назад

** DISPUTED ** The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id."

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-5hrh-8wcf-9v58

почти 4 года назад

Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.

EPSS: Низкий
github логотип

GHSA-5hqh-c84r-qjcv

около 1 года назад

Integer overflow in the firebird and dblib quoters causing OOB writes

EPSS: Низкий
github логотип

GHSA-5h5w-vq2m-cxf3

почти 4 года назад

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

EPSS: Низкий
github логотип

GHSA-5gfp-g883-wjfx

больше 3 лет назад

Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-5g4m-4pg3-qmxc

почти 4 года назад

Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.

EPSS: Высокий
github логотип

GHSA-5g3j-w9cx-2985

больше 3 лет назад

Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.

EPSS: Средний
github логотип

GHSA-5f28-362x-vgw6

больше 3 лет назад

The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature.

EPSS: Низкий
github логотип

GHSA-5c54-wvq7-976j

почти 4 года назад

The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.

EPSS: Низкий
github логотип

GHSA-59wc-4gch-hhw5

почти 4 года назад

The Linear Congruential Generator (LCG) in PHP before 5.2.13 does not provide the expected entropy, which makes it easier for context-dependent attackers to guess values that were intended to be unpredictable, as demonstrated by session cookies generated by using the uniqid function.

EPSS: Низкий
github логотип

GHSA-599v-cg8r-98qv

почти 4 года назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

EPSS: Средний
github логотип

GHSA-597j-mqq5-5h6x

почти 4 года назад

Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).

EPSS: Низкий
github логотип

GHSA-57q9-cw6p-2qrg

почти 4 года назад

Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.

EPSS: Низкий
github логотип

GHSA-553r-9qxm-9m7h

больше 3 лет назад

The chunk_split function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

EPSS: Низкий
github логотип

GHSA-54hq-v5wp-fqgv

почти 3 года назад

DoS vulnerability when parsing multipart request body

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-54gj-pv8c-2qj3

больше 3 лет назад

In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-5394-7mcx-63pv

больше 3 лет назад

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.

EPSS: Высокий
github логотип

GHSA-4xfp-7xc2-6c73

почти 4 года назад

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions.

EPSS: Средний
github логотип

GHSA-4w77-75f9-2c8w

около 1 года назад

Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-5jqx-3p4m-wv4h

Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.

CVSS3: 9.8
6%
Низкий
больше 3 лет назад
github логотип
GHSA-5jh5-7283-3xvx

** DISPUTED ** The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id."

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-5hrh-8wcf-9v58

Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.

0%
Низкий
почти 4 года назад
github логотип
GHSA-5hqh-c84r-qjcv

Integer overflow in the firebird and dblib quoters causing OOB writes

0%
Низкий
около 1 года назад
github логотип
GHSA-5h5w-vq2m-cxf3

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.

8%
Низкий
почти 4 года назад
github логотип
GHSA-5gfp-g883-wjfx

Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.

CVSS3: 9.8
13%
Средний
больше 3 лет назад
github логотип
GHSA-5g4m-4pg3-qmxc

Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.

87%
Высокий
почти 4 года назад
github логотип
GHSA-5g3j-w9cx-2985

Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.

17%
Средний
больше 3 лет назад
github логотип
GHSA-5f28-362x-vgw6

The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-5c54-wvq7-976j

The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.

8%
Низкий
почти 4 года назад
github логотип
GHSA-59wc-4gch-hhw5

The Linear Congruential Generator (LCG) in PHP before 5.2.13 does not provide the expected entropy, which makes it easier for context-dependent attackers to guess values that were intended to be unpredictable, as demonstrated by session cookies generated by using the uniqid function.

5%
Низкий
почти 4 года назад
github логотип
GHSA-599v-cg8r-98qv

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

13%
Средний
почти 4 года назад
github логотип
GHSA-597j-mqq5-5h6x

Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).

2%
Низкий
почти 4 года назад
github логотип
GHSA-57q9-cw6p-2qrg

Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.

4%
Низкий
почти 4 года назад
github логотип
GHSA-553r-9qxm-9m7h

The chunk_split function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-54hq-v5wp-fqgv

DoS vulnerability when parsing multipart request body

CVSS3: 7.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-54gj-pv8c-2qj3

In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.

CVSS3: 7.5
50%
Средний
больше 3 лет назад
github логотип
GHSA-5394-7mcx-63pv

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.

87%
Высокий
больше 3 лет назад
github логотип
GHSA-4xfp-7xc2-6c73

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions.

27%
Средний
почти 4 года назад
github логотип
GHSA-4w77-75f9-2c8w

Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface

около 1 года назад

Уязвимостей на страницу