Filtered by vendor Php
Subscriptions
Total
766 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-0484 | 1 Php | 1 Php | 2025-04-03 | N/A |
move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. | ||||
CVE-2003-0861 | 1 Php | 1 Php | 2025-04-03 | N/A |
Integer overflows in (1) base64_encode and (2) the GD library for PHP before 4.3.3 have unknown impact and unknown attack vectors. | ||||
CVE-2005-3392 | 1 Php | 1 Php | 2025-04-03 | N/A |
Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives. | ||||
CVE-2005-4154 | 1 Php | 1 Pear | 2025-04-03 | N/A |
Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded. | ||||
CVE-2006-0097 | 1 Php | 1 Php | 2025-04-03 | N/A |
Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. | ||||
CVE-2006-0144 | 2 Apache2triad, Php | 2 Apache2triad, Pear | 2025-04-03 | N/A |
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function. | ||||
CVE-2006-0207 | 1 Php | 1 Php | 2025-04-03 | N/A |
Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. | ||||
CVE-2006-0208 | 2 Php, Redhat | 3 Php, Enterprise Linux, Rhel Stronghold | 2025-04-03 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message. | ||||
CVE-2006-0996 | 2 Php, Redhat | 3 Php, Enterprise Linux, Rhel Stronghold | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed. | ||||
CVE-2006-1558 | 1 Php | 1 Php Script Index | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in search.php in PHP Script Index allows remote attackers to inject arbitrary web script or HTML via the search parameter. | ||||
CVE-2006-1559 | 1 Php | 1 Php Script Index | 2025-04-03 | N/A |
SQL injection vulnerability in PHP Script Index allows remote attackers to execute arbitrary SQL commands via the search parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | ||||
CVE-2006-1608 | 1 Php | 1 Php | 2025-04-03 | N/A |
The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI. | ||||
CVE-2006-2419 | 1 Php | 1 Directory Listing Script | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in index.php in Directory Listing Script allows remote attackers to inject arbitrary web script or HTML via the dir parameter. | ||||
CVE-2006-4481 | 1 Php | 1 Php | 2025-04-03 | N/A |
The (1) file_exists and (2) imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CVE-2006-1017. | ||||
CVE-2006-4483 | 1 Php | 1 Php | 2025-04-03 | N/A |
The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache. | ||||
CVE-2006-4485 | 2 Php, Redhat | 2 Php, Rhel Application Stack | 2025-04-03 | N/A |
The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read. | ||||
CVE-1999-0058 | 1 Php | 1 Php | 2025-04-03 | N/A |
Buffer overflow in PHP cgi program, php.cgi allows shell access. | ||||
CVE-1999-0068 | 1 Php | 1 Php | 2025-04-03 | N/A |
CGI PHP mylog script allows an attacker to read any file on the target server. | ||||
CVE-1999-0238 | 1 Php | 1 Php | 2025-04-03 | N/A |
php.cgi allows attackers to read any file on the system. | ||||
CVE-2000-0059 | 1 Php | 1 Php | 2025-04-03 | N/A |
PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands. |