Show filters
4,018 Total Results
Displaying 11-20 of 4,018
Sort by:
Attacker Value
Low
CVE-2020-7065
Disclosure Date: March 17, 2020 (last updated November 27, 2024)
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
0
Attacker Value
Low
CVE-2019-19908
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.
0
Attacker Value
Low
CVE-2018-19518
Disclosure Date: November 25, 2018 (last updated November 08, 2023)
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
0
Attacker Value
Unknown
CVE-2017-9841
Disclosure Date: June 27, 2017 (last updated November 26, 2024)
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
1
Attacker Value
Unknown
CVE-2014-4721
Disclosure Date: July 06, 2014 (last updated October 05, 2023)
The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
1
Attacker Value
Unknown
CVE-2012-2329 PHP Apache Request Headers
Disclosure Date: May 11, 2012 (last updated December 06, 2023)
Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.
0
Attacker Value
Unknown
CVE-2009-1151
Disclosure Date: March 26, 2009 (last updated July 17, 2024)
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
1
Attacker Value
Very High
CVE-2008-0599
Disclosure Date: May 05, 2008 (last updated February 03, 2024)
The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
0
Attacker Value
Unknown
CVE-2025-26572
Disclosure Date: February 13, 2025 (last updated February 14, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7.
0
Attacker Value
Unknown
CVE-2022-31631
Disclosure Date: February 12, 2025 (last updated February 13, 2025)
In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.
0