CVE-2024-4577
- EPSS 94.37%
- Veröffentlicht 09.06.2024 20:15:09
- Zuletzt bearbeitet 03.11.2025 19:23:39
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given...
CVE-2024-5458
- EPSS 3.58%
- Veröffentlicht 09.06.2024 19:15:52
- Zuletzt bearbeitet 03.11.2025 23:17:30
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid u...
CVE-2024-5585
- EPSS 0.9%
- Veröffentlicht 09.06.2024 19:15:52
- Zuletzt bearbeitet 21.11.2024 09:47:58
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient ...
CVE-2024-2757
- EPSS 0.63%
- Veröffentlicht 29.04.2024 04:15:08
- Zuletzt bearbeitet 04.11.2025 18:16:18
In PHP 8.3.* before 8.3.5, function mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application ...
CVE-2024-3096
- EPSS 1.07%
- Veröffentlicht 29.04.2024 04:15:08
- Zuletzt bearbeitet 04.11.2025 18:16:30
In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
CVE-2024-1874
- EPSS 51.85%
- Veröffentlicht 29.04.2024 04:15:07
- Zuletzt bearbeitet 04.11.2025 19:16:27
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can su...
CVE-2024-2756
- EPSS 6.49%
- Veröffentlicht 29.04.2024 04:15:07
- Zuletzt bearbeitet 04.11.2025 18:16:18
Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applic...
CVE-2024-3566
- EPSS 5.99%
- Veröffentlicht 10.04.2024 16:15:16
- Zuletzt bearbeitet 18.11.2025 18:16:05
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
CVE-2022-4900
- EPSS 0.13%
- Veröffentlicht 02.11.2023 16:15:08
- Zuletzt bearbeitet 03.11.2025 22:16:01
A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
CVE-2023-3824
- EPSS 32.17%
- Veröffentlicht 11.08.2023 06:15:10
- Zuletzt bearbeitet 13.02.2025 17:16:59
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption...