Search criteria
6 vulnerabilities found for alternative_php_cache by pecl-php
FKIE_CVE-2010-3294
Vulnerability from fkie_nvd - Published: 2010-09-24 19:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:*:p1:*:*:*:*:*:*",
"matchCriteriaId": "898279E0-1F9A-4D45-9902-6D9C2153B30E",
"versionEndIncluding": "3.1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2912FEC9-E71E-431C-ACA7-27C0A8E6B107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC80D4-0550-4C59-9392-6EF1361C0D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8AB12D-D0BB-4628-9F6F-B716C1ACC3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22F8AFE5-A612-4250-BB99-88F108835BD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BE7CB7-EC2C-419F-82B9-3D1ADEBF6DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEFF307-0EE8-49A8-B10F-EEC1DC2FEF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA1C3CB-7B1A-4BF3-9791-F699D5B33CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99F9F5F7-957E-49B1-A58E-B4BC2B02B755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1360E41-F961-4915-83EB-9D3E41FB26F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECA9D41-000B-4F3E-BAF4-6D42DAB39731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E7544B6B-D153-4937-8FE6-C06246642917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EA23F233-C2D0-43B3-AA15-D459BE760C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1A28E4-655D-483E-BCEE-2423290850A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B41719E9-1268-49B1-837C-0AFDD151A7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B9EEB5-472F-44BA-BEE7-07E1BDE2FCD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C918A8A-DC10-4ECC-852E-3738A89F874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D615703C-94A1-41D1-BB09-C76195A29A46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12:p1:*:*:*:*:*:*",
"matchCriteriaId": "638C2836-35FE-49AF-ABF7-1936742AB021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12:p2:*:*:*:*:*:*",
"matchCriteriaId": "088936F3-F52F-4C35-83E3-A8D4847703A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "86A81C28-309E-44CE-9221-3B1CB84DD981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A496D93C-375A-4B06-BC5B-0AB9B41BB6BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B3318828-8848-4B4E-8FCD-A12A6EC3E733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "48DE97C6-4950-4337-9913-03A8C7D70E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "95FAD318-61E4-4E63-8452-9BC1648F1743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B582BF89-C915-4C00-B3D2-88F349D64EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "687D64D6-600F-4143-B80F-38FF9584E323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0839C225-9FE1-4016-805F-90AFC8EA4E26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B97851F4-0B94-48CE-A65E-AA23581D6C94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "257F7098-16E9-494F-AD14-DFC97FF17389",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en apc.php de la extensi\u00f3n \"Alternative PHP Cache\" (APC) en versiones anteriores a la v3.1.4 para PHP permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores de ataque sin especificar."
}
],
"id": "CVE-2010-3294",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-24T19:00:04.933",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1488
Vulnerability from fkie_nvd - Published: 2008-03-24 23:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| pecl-php | alternative_php_cache | 3.0.11 | |
| pecl-php | alternative_php_cache | 3.0.12 | |
| pecl-php | alternative_php_cache | 3.0.12p1 | |
| pecl-php | alternative_php_cache | 3.0.12p2 | |
| pecl-php | alternative_php_cache | 3.0.13 | |
| pecl-php | alternative_php_cache | 3.0.14 | |
| pecl-php | alternative_php_cache | 3.0.15 | |
| pecl-php | alternative_php_cache | 3.0.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C918A8A-DC10-4ECC-852E-3738A89F874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D615703C-94A1-41D1-BB09-C76195A29A46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12p1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE771CF6-EDBC-492F-A251-2613EF46E66E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.12p2:*:*:*:*:*:*:*",
"matchCriteriaId": "11BBF635-1FA0-4A77-A240-76935DDFE17D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "86A81C28-309E-44CE-9221-3B1CB84DD981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A496D93C-375A-4B06-BC5B-0AB9B41BB6BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B3318828-8848-4B4E-8FCD-A12A6EC3E733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pecl-php:alternative_php_cache:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "48DE97C6-4950-4337-9913-03A8C7D70E46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en apc.c de Alternative PHP Cache (APC) de 3.0.11 a 3.0.16 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un nombre de archivo largo."
}
],
"id": "CVE-2008-1488",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-24T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29509"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29745"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31082"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/28457"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31082"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/28457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2010-3294 (GCVE-0-2010-3294)
Vulnerability from cvelistv5 – Published: 2010-09-24 18:00 – Updated: 2024-08-07 03:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:03:18.918Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"name": "ADV-2010-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"name": "RHSA-2012:0811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-09-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-23T09:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"name": "ADV-2010-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"name": "RHSA-2012:0811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-3294",
"datePublished": "2010-09-24T18:00:00.000Z",
"dateReserved": "2010-09-13T00:00:00.000Z",
"dateUpdated": "2024-08-07T03:03:18.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1488 (GCVE-0-2008-1488)
Vulnerability from cvelistv5 – Published: 2008-03-24 23:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:24:42.237Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2008-6401",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29745"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28457"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2008-6401",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29745"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28457"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1488",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2008-6401",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29745"
},
{
"name": "http://papasian.org/~dannyp/apcsmash.php.txt",
"refsource": "MISC",
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"name": "http://pecl.php.net/bugs/bug.php?id=13415",
"refsource": "CONFIRM",
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28457"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1488",
"datePublished": "2008-03-24T23:00:00.000Z",
"dateReserved": "2008-03-24T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:24:42.237Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3294 (GCVE-0-2010-3294)
Vulnerability from nvd – Published: 2010-09-24 18:00 – Updated: 2024-08-07 03:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:03:18.918Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"name": "ADV-2010-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"name": "RHSA-2012:0811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-09-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-23T09:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://pecl.php.net/package-changelog.php?package=APC\u0026release=3.1.4"
},
{
"name": "ADV-2010-2406",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2406"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"name": "RHSA-2012:0811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-3294",
"datePublished": "2010-09-24T18:00:00.000Z",
"dateReserved": "2010-09-13T00:00:00.000Z",
"dateUpdated": "2024-08-07T03:03:18.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1488 (GCVE-0-2008-1488)
Vulnerability from nvd – Published: 2008-03-24 23:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:24:42.237Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2008-6401",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29745"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28457"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2008-6401",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29745"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28457"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1488",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2008-6401",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html"
},
{
"name": "29745",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29745"
},
{
"name": "http://papasian.org/~dannyp/apcsmash.php.txt",
"refsource": "MISC",
"url": "http://papasian.org/~dannyp/apcsmash.php.txt"
},
{
"name": "http://pecl.php.net/bugs/bug.php?id=13415",
"refsource": "CONFIRM",
"url": "http://pecl.php.net/bugs/bug.php?id=13415"
},
{
"name": "apc-apcsearchpaths-bo(41420)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41420"
},
{
"name": "29509",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29509"
},
{
"name": "FEDORA-2008-6344",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html"
},
{
"name": "MDVSA-2008:082",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:082"
},
{
"name": "31082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31082"
},
{
"name": "GLSA-200804-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-07.xml"
},
{
"name": "28457",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28457"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1488",
"datePublished": "2008-03-24T23:00:00.000Z",
"dateReserved": "2008-03-24T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:24:42.237Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}