Vulnerabilities > PHP > PHP > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-03-07 | CVE-2006-1017 | Unspecified vulnerability in PHP The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. | 9.3 |
2006-01-13 | CVE-2006-0200 | USE of Externally-Controlled Format String vulnerability in PHP 5.1.0/5.1.1 Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages. | 9.3 |
2005-01-10 | CVE-2004-1018 | Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the pack function, or (3) an "integer overflow/underflow" in the unpack function. | 10.0 |
2005-01-10 | CVE-2004-1019 | Improper Input Validation vulnerability in multiple products The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results. | 10.0 |
2005-01-10 | CVE-2004-1063 | PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. | 10.0 |
2005-01-10 | CVE-2004-1064 | The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. | 10.0 |
2005-01-10 | CVE-2004-1065 | Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file. | 10.0 |
2004-08-06 | CVE-2004-0542 | Unspecified vulnerability in PHP PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function. | 10.0 |
2003-11-17 | CVE-2003-0860 | Unspecified vulnerability in PHP Buffer overflows in PHP before 4.3.3 have unknown impact and unknown attack vectors. | 10.0 |
2003-11-17 | CVE-2003-0861 | Remote Security vulnerability in PHP Integer overflows in (1) base64_encode and (2) the GD library for PHP before 4.3.3 have unknown impact and unknown attack vectors. | 10.0 |