Php

Php

711 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.75%
  • Veröffentlicht 02.04.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue...

Exploit
  • EPSS 15.35%
  • Veröffentlicht 30.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, tr...

Exploit
  • EPSS 19.41%
  • Veröffentlicht 28.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages. NO...

Exploit
  • EPSS 21.52%
  • Veröffentlicht 28.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of...

Exploit
  • EPSS 5.11%
  • Veröffentlicht 27.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbit...

  • EPSS 10.87%
  • Veröffentlicht 27.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling se...

  • EPSS 1.27%
  • Veröffentlicht 27.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.

  • EPSS 0.16%
  • Veröffentlicht 27.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a...

  • EPSS 17.68%
  • Veröffentlicht 27.03.2007 01:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was in...

Exploit
  • EPSS 7.61%
  • Veröffentlicht 24.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.