Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php pear 0.2.2 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2011-1072
The installer in PEAR prior to 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
Php Pear 0.9
Php Pear 1.3.4
Php Pear 1.2.1
Php Pear 1.3.3.1
Php Pear 1.4.2
Php Pear 1.0.1
Php Pear 1.0
Php Pear 1.2
Php Pear 1.5.0
Php Pear 1.3
Php Pear 0.90
Php Pear 1.5.1
Php Pear 1.4.0
Php Pear 1.4.1
Php Pear 1.3.5
Php Pear
Php Pear 1.3.6
Php Pear 1.3.3
Php Pear 1.3.1
Php Pear 0.2.2
Php Pear 0.10
Php Pear 1.6.1
3.3
CVSSv2
CVE-2011-1144
The installer in PEAR 1.9.2 and previous versions allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists be...
Php Pear 0.9
Php Pear 1.3.4
Php Pear 1.2.1
Php Pear
Php Pear 1.3.3.1
Php Pear 1.4.2
Php Pear 1.0.1
Php Pear 1.0
Php Pear 1.2
Php Pear 1.5.0
Php Pear 1.3
Php Pear 0.90
Php Pear 1.5.1
Php Pear 1.9.1
Php Pear 1.4.0
Php Pear 1.4.1
Php Pear 1.3.5
Php Pear 1.3.6
Php Pear 1.3.3
Php Pear 1.3.1
Php Pear 0.2.2
Php Pear 0.10
7.5
CVSSv2
CVE-2006-0144
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote malicious users to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify functi...
Apache2triad Apache2triad
Php Pear 0.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
remote code execution
CVE-2024-37080
CVE-2024-5182
CVE-2024-4390
CVE-2024-6100
brute force
CVE-2021-47581
file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started