Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-1887 | 7.5 |
Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by ca
|
21-07-2022 - 15:12 | 06-04-2007 - 01:19 | |
CVE-2007-1888 | 7.5 |
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some
|
30-10-2018 - 16:25 | 06-04-2007 - 01:19 | |
CVE-2007-1884 | 6.8 |
Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the p
|
30-10-2018 - 16:25 | 06-04-2007 - 01:19 | |
CVE-2007-1890 | 7.5 |
Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff
|
30-10-2018 - 16:25 | 06-04-2007 - 01:19 | |
CVE-2007-1835 | 4.6 |
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
|
30-10-2018 - 16:25 | 03-04-2007 - 00:19 | |
CVE-2007-1883 | 7.8 |
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via t
|
30-10-2018 - 16:25 | 06-04-2007 - 01:19 | |
CVE-2007-1700 | 7.5 |
The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbit
|
30-10-2018 - 16:25 | 27-03-2007 - 01:19 | |
CVE-2007-1582 | 6.8 |
The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error
|
30-10-2018 - 16:25 | 21-03-2007 - 23:19 | |
CVE-2007-1777 | 7.5 |
Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, tr
|
30-10-2018 - 16:25 | 30-03-2007 - 01:19 | |
CVE-2007-1825 | 7.5 |
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue
|
30-10-2018 - 16:25 | 02-04-2007 - 23:19 | |
CVE-2007-1581 | 9.3 |
The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify in
|
30-10-2018 - 16:25 | 21-03-2007 - 23:19 | |
CVE-2007-1378 | 5.1 |
The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments.
|
30-10-2018 - 16:25 | 10-03-2007 - 00:19 | |
CVE-2007-1379 | 5.1 |
The ovrimos_close function in the Ovrimos extension for PHP before 4.4.5 can trigger efree of an arbitrary address, which might allow context-dependent attackers to execute arbitrary code.
|
30-10-2018 - 16:25 | 10-03-2007 - 00:19 | |
CVE-2007-1376 | 7.5 |
The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associ
|
30-10-2018 - 16:25 | 10-03-2007 - 00:19 | |
CVE-2007-1484 | 4.6 |
The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operatio
|
19-10-2018 - 18:18 | 16-03-2007 - 21:19 | |
CVE-2006-1549 | 2.1 |
PHP 4.4.2 and 5.1.2 allows local users to cause a crash (segmentation fault) by defining and executing a recursive function. NOTE: it has been reported by a reliable third party that some later versions are also affected. Upgrade to PHP 5.1.3-RC3
|
18-10-2018 - 16:33 | 10-04-2006 - 22:58 | |
CVE-2007-1900 | 5.0 |
CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression
|
11-10-2017 - 01:32 | 10-04-2007 - 18:19 | |
CVE-2007-1889 | 7.5 |
Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP
|
29-07-2017 - 01:31 | 06-04-2007 - 01:19 | |
CVE-2007-1824 | 5.1 |
Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
|
29-07-2017 - 01:31 | 02-04-2007 - 23:19 | |
CVE-2007-1399 | 10.0 |
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from
|
29-07-2017 - 01:30 | 10-03-2007 - 22:19 | |
CVE-2007-1649 | 7.8 |
PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
|
29-07-2017 - 01:30 | 24-03-2007 - 00:19 | |
CVE-2007-1461 | 7.8 |
The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended direct
|
13-07-2011 - 04:00 | 14-03-2007 - 18:19 | |
CVE-2007-1460 | 5.0 |
The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories.
|
24-05-2011 - 04:00 | 14-03-2007 - 18:19 | |
CVE-2007-1522 | 6.8 |
Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which call
|
08-03-2011 - 02:52 | 20-03-2007 - 20:19 | |
CVE-2007-1521 | 6.8 |
Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a
|
08-03-2011 - 02:52 | 20-03-2007 - 20:19 | |
CVE-2007-1287 | 4.3 |
A regression error in the phpinfo function in PHP 4.4.3 to 4.4.6, and PHP 6.0 in CVS, allows remote attackers to conduct cross-site scripting (XSS) attacks via GET, POST, or COOKIE array values, which are not escaped in the phpinfo output, as origina
|
08-03-2011 - 02:51 | 06-03-2007 - 20:19 | |
CVE-2007-1454 | 4.3 |
ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a '<' character followed by
|
05-09-2008 - 21:20 | 14-03-2007 - 18:19 | |
CVE-2007-1453 | 7.5 |
Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes
|
05-09-2008 - 21:20 | 14-03-2007 - 18:19 | |
CVE-2007-1381 | 7.6 |
The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers
|
05-09-2008 - 21:20 | 10-03-2007 - 00:19 | |
CVE-2007-1452 | 5.0 |
The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement the input filtering hooks for ext/filter, which allows remote attackers to bypass web site filters via an application/vnd.fdf formatted POST.
|
05-09-2008 - 21:20 | 14-03-2007 - 18:19 | |
CVE-2007-1383 | 10.0 |
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
|
05-09-2008 - 04:00 | 10-03-2007 - 00:19 |