Php

Php

714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 10.82%
  • Veröffentlicht 17.12.2008 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log"...

  • EPSS 10.37%
  • Veröffentlicht 18.09.2008 17:59:33
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce cryptographically strong random numbers, which allows attackers to leverage exposures in products that rely on these functions for security-relevant functionality, as demonstrated by ...

Exploit
  • EPSS 10.75%
  • Veröffentlicht 15.08.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

  • EPSS 14.23%
  • Veröffentlicht 15.08.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function...

  • EPSS 15.97%
  • Veröffentlicht 15.08.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.

Exploit
  • EPSS 4.13%
  • Veröffentlicht 07.07.2008 23:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins ...

  • EPSS 9.64%
  • Veröffentlicht 23.06.2008 20:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c lega...

Exploit
  • EPSS 3.57%
  • Veröffentlicht 20.06.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in the posix_access function in PHP 5.2.6 and earlier allows remote attackers to bypass safe_mode restrictions via a .. (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after...

  • EPSS 7.27%
  • Veröffentlicht 20.06.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to ...

Exploit
  • EPSS 3.09%
  • Veröffentlicht 07.05.2008 21:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subse...