Php

Php

714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 04.09.2007 19:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.

  • EPSS 9.57%
  • Veröffentlicht 04.09.2007 18:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a la...

Exploit
  • EPSS 30.12%
  • Veröffentlicht 04.09.2007 18:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.

  • EPSS 5.89%
  • Veröffentlicht 04.09.2007 18:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certai...

Exploit
  • EPSS 3.2%
  • Veröffentlicht 30.08.2007 18:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

  • EPSS 4.87%
  • Veröffentlicht 29.08.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to...

  • EPSS 3.33%
  • Veröffentlicht 25.08.2007 00:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Foreign Function Interface (ffi) extension in PHP 5.0.5 does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code by loading an arbitrary DLL and calling a function, as demonstrated by kernel32.dll...

  • EPSS 3.11%
  • Veröffentlicht 23.08.2007 19:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in the php_ntuser component for PHP 5.2.3 allow context-dependent attackers to cause a denial of service or execute arbitrary code via long arguments to the (1) ntuser_getuserlist, (2) ntuser_getuserinfo, (3) ntuser_getuserg...

  • EPSS 0.43%
  • Veröffentlicht 21.08.2007 00:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.

  • EPSS 9.3%
  • Veröffentlicht 08.08.2007 23:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the mSQL extension in PHP 5.2.3 allows context-dependent attackers to execute arbitrary code via a long first argument to the msql_connect function.