Php

Php

711 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.53%
  • Published 16.07.2007 22:30:00
  • Last modified 09.04.2025 00:30:58

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the sessio...

  • EPSS 4.22%
  • Published 15.07.2007 23:30:00
  • Last modified 09.04.2025 00:30:58

The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.

Exploit
  • EPSS 3.2%
  • Published 29.06.2007 18:30:00
  • Last modified 09.04.2025 00:30:58

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execu...

  • EPSS 5.39%
  • Published 20.06.2007 21:30:00
  • Last modified 09.04.2025 00:30:58

Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unsp...

  • EPSS 1.7%
  • Published 13.06.2007 10:30:00
  • Last modified 09.04.2025 00:30:58

The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it ...

  • EPSS 16.27%
  • Published 04.06.2007 17:30:00
  • Last modified 09.04.2025 00:30:58

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

  • EPSS 1.52%
  • Published 04.06.2007 17:30:00
  • Last modified 09.04.2025 00:30:58

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this ...

Exploit
  • EPSS 2.85%
  • Published 24.05.2007 18:30:00
  • Last modified 09.04.2025 00:30:58

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the s...

  • EPSS 0.91%
  • Published 24.05.2007 18:30:00
  • Last modified 09.04.2025 00:30:58

PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite interna...

  • EPSS 0.24%
  • Published 22.05.2007 19:30:00
  • Last modified 09.04.2025 00:30:58

The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.