Php

Php

711 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.37%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the p...

Exploit
  • EPSS 1.56%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows...

  • EPSS 0.71%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an "off ...

  • EPSS 3.11%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by ca...

  • EPSS 3.1%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some ...

  • EPSS 6.79%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP ...

Exploit
  • EPSS 5.65%
  • Published 06.04.2007 01:19:00
  • Last modified 09.04.2025 00:30:58

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff...

  • EPSS 13.39%
  • Published 06.04.2007 00:19:00
  • Last modified 09.04.2025 00:30:58

Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) ...

  • EPSS 0.16%
  • Published 03.04.2007 00:19:00
  • Last modified 09.04.2025 00:30:58

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

Exploit
  • EPSS 2.14%
  • Published 02.04.2007 23:19:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.