Max CVSS | 10.0 | Min CVSS | 7.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2004-1064 | 10.0 |
The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before public
|
08-12-2020 - 18:56 | 10-01-2005 - 05:00 | |
CVE-2004-1063 | 10.0 |
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters
|
08-12-2020 - 18:54 | 10-01-2005 - 05:00 | |
CVE-2006-4433 | 7.5 |
PHP before 4.4.3 and 5.x before 5.1.4 does not limit the character set of the session identifier (PHPSESSID) for third party session handlers, which might make it easier for remote attackers to exploit other vulnerabilities by inserting PHP code into
|
30-10-2018 - 16:25 | 29-08-2006 - 00:04 | |
CVE-2006-1017 | 9.3 |
The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open
|
30-10-2018 - 16:25 | 07-03-2006 - 00:02 | |
CVE-2006-0097 | 7.5 |
Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long
|
19-10-2018 - 15:42 | 06-01-2006 - 11:03 |