CVE-2007-3799
- EPSS 9.53%
- Published 16.07.2007 22:30:00
- Last modified 09.04.2025 00:30:58
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the sessio...
CVE-2007-3790
- EPSS 4.22%
- Published 15.07.2007 23:30:00
- Last modified 09.04.2025 00:30:58
The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.
CVE-2007-3378
- EPSS 3.2%
- Published 29.06.2007 18:30:00
- Last modified 09.04.2025 00:30:58
The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execu...
CVE-2007-3294
- EPSS 5.39%
- Published 20.06.2007 21:30:00
- Last modified 09.04.2025 00:30:58
Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unsp...
- EPSS 1.7%
- Published 13.06.2007 10:30:00
- Last modified 09.04.2025 00:30:58
The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it ...
CVE-2007-2872
- EPSS 16.27%
- Published 04.06.2007 17:30:00
- Last modified 09.04.2025 00:30:58
Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
- EPSS 1.52%
- Published 04.06.2007 17:30:00
- Last modified 09.04.2025 00:30:58
PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this ...
- EPSS 2.85%
- Published 24.05.2007 18:30:00
- Last modified 09.04.2025 00:30:58
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the s...
CVE-2007-2844
- EPSS 0.91%
- Published 24.05.2007 18:30:00
- Last modified 09.04.2025 00:30:58
PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite interna...
CVE-2006-7204
- EPSS 0.24%
- Published 22.05.2007 19:30:00
- Last modified 09.04.2025 00:30:58
The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.