Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 5.1.0 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2006-0200
Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote malicious users to execute arbitrary code via format string specifiers in MySQL error messages.
Php Php 5.1.0
Php Php 5.1.1
231
VMScore
CVE-2006-4484
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP prior to 5.1.5 allows remote malicious users to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing t...
Php Php 5.1.4
Php Php 5.1.0
Php Php 5.1.1
Php Php 5.1.2
641
VMScore
CVE-2006-4481
The (1) file_exists and (2) imap_reopen functions in PHP prior to 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CV...
Php Php 5.1.1
Php Php 5.1.2
Php Php 5.1.4
Php Php 5.1.0
890
VMScore
CVE-2006-4485
The stripos function in PHP prior to 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read.
Php Php 5.1.1
Php Php 5.1.2
Php Php 5.1.4
Php Php 5.1.0
231
VMScore
CVE-2006-4486
Integer overflow in memory allocation routines in PHP prior to 5.1.6, when running on a 64-bit system, allows context-dependent malicious users to bypass the memory_limit restriction.
Php Php 5.1.0
Php Php 5.1.4
Php Php 5.1.5
Php Php 5.1.1
Php Php 5.1.2
506
VMScore
CVE-2018-19246
PHP-Proxy 5.1.0 allows remote malicious users to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default confi...
Php-proxy Php-proxy 5.1.0
1 EDB exploit
2 Github repositories
446
VMScore
CVE-2018-19784
The str_rot_pass function in vendor/atholn1600/php-proxy/src/helpers.php in PHP-Proxy 5.1.0 uses weak cryptography, which makes it easier for malicious users to calculate the authorization data needed for local file inclusion.
Php-proxy Php-proxy 5.1.0
445
VMScore
CVE-2006-0207
Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote malicious users to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function.
Php Php 5.0
Php Php 5.0.3
Php Php 5.0.4
Php Php 5.0.0
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 5.0.5
668
VMScore
CVE-2006-5465
Buffer overflow in PHP prior to 5.2.0 allows remote malicious users to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
Php Php 5.0.0
Php Php 5.0
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 5.0.5
Php Php 5.1.4
Php Php 5.1.5
Php Php
Php Php 5.0.3
Php Php 5.0.4
Php Php 5.1.2
Php Php 5.1.3
641
VMScore
CVE-2006-5706
Unspecified vulnerabilities in PHP, probably prior to 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.
Php Php 5.0.1
Php Php 5.0
Php Php
Php Php 5.1.1
Php Php 5.1.2
Php Php 5.1.3
Php Php 5.1.4
Php Php 5.1.5
Php Php 5.0.2
Php Php 5.0.3
Php Php 5.0.4
Php Php 5.0.5
Php Php 5.0.0
Php Php 5.1.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »