Php

Php

711 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 11.64%
  • Veröffentlicht 21.03.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify in...

  • EPSS 3.46%
  • Veröffentlicht 21.03.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error ...

  • EPSS 21.08%
  • Veröffentlicht 21.03.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with...

  • EPSS 3.41%
  • Veröffentlicht 21.03.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.

Exploit
  • EPSS 16.87%
  • Veröffentlicht 20.03.2007 20:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a...

Exploit
  • EPSS 8.95%
  • Veröffentlicht 20.03.2007 20:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which call...

Exploit
  • EPSS 1.62%
  • Veröffentlicht 16.03.2007 21:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 16.03.2007 21:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operatio...

  • EPSS 11.32%
  • Veröffentlicht 14.03.2007 18:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement the input filtering hooks for ext/filter, which allows remote attackers to bypass web site filters via an application/vnd.fdf formatted POST.

Exploit
  • EPSS 3.15%
  • Veröffentlicht 14.03.2007 18:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes...