Max CVSS | 10.0 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2004-1064 | 10.0 |
The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before public
|
08-12-2020 - 18:56 | 10-01-2005 - 05:00 | |
CVE-2004-1063 | 10.0 |
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters
|
08-12-2020 - 18:54 | 10-01-2005 - 05:00 | |
CVE-2004-1018 | 10.0 |
Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underfl
|
08-12-2020 - 18:49 | 10-01-2005 - 05:00 | |
CVE-2004-1065 | 10.0 |
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
|
30-10-2018 - 16:25 | 10-01-2005 - 05:00 | |
CVE-2004-1019 | 10.0 |
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free
|
30-10-2018 - 16:25 | 10-01-2005 - 05:00 | |
CVE-2004-1020 | 5.0 |
The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but a
|
11-07-2017 - 01:30 | 10-01-2005 - 05:00 | |
CVE-2004-1318 | 4.3 |
Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab ("%09") character, which prevents the rest of the query from being
|
11-07-2017 - 01:30 | 06-01-2005 - 05:00 |