Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 5.1.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2563
The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows malicious users to bypass safe mode and read files via a file:// request containing null characters.
Php Php 5.1.4
Php Php 4.4.2
NA
CVE-2006-4023
The ip2long function in PHP 5.1.4 and previous versions may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote malicious users to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X...
Php Php 5.1.4
Php Php 4.3.3
Php Php 5.0.2
NA
CVE-2006-4481
The (1) file_exists and (2) imap_reopen functions in PHP prior to 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CV...
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.4
Php Php 5.1.0
NA
CVE-2006-4484
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP prior to 5.1.5 allows remote malicious users to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing t...
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.4
Php Php 5.1.0
NA
CVE-2006-4485
The stripos function in PHP prior to 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read.
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.4
Php Php 5.1.0
NA
CVE-2006-4486
Integer overflow in memory allocation routines in PHP prior to 5.1.6, when running on a 64-bit system, allows context-dependent malicious users to bypass the memory_limit restriction.
Php Php 5.1.5
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.4
Php Php 5.1.0
NA
CVE-2006-5465
Buffer overflow in PHP prior to 5.2.0 allows remote malicious users to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
Php Php 5.1.5
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.0
Php Php 5.0.5
Php Php 5.0.1
Php Php 5.1.4
Php Php 5.0.4
Php Php
Php Php 5.0.3
Php Php 5.1.0
Php Php 5.1.3
Php Php 5.0.2
Php Php 5.0.0
NA
CVE-2006-5706
Unspecified vulnerabilities in PHP, probably prior to 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.
Php Php 5.1.5
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.0
Php Php 5.0.5
Php Php 5.0.1
Php Php 5.1.4
Php Php 5.0.4
Php Php
Php Php 5.0.3
Php Php 5.1.0
Php Php 5.1.3
Php Php 5.0.2
Php Php 5.0.0
NA
CVE-2007-1824
Buffer overflow in the php_stream_filter_create function in PHP 5 prior to 5.2.1 allows remote malicious users to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
Php Php 5.1.5
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.6
Php Php 5.0.5
Php Php 5.0.1
Php Php 5.1.4
Php Php 5.0.4
Php Php 5.0.3
Php Php 5.1.0
Php Php 5.2.0
Php Php 5.1.3
Php Php 5.0.2
Php Php 5.0.0
NA
CVE-2007-1452
The FDF support (ext/fdf) in PHP 5.2.0 and previous versions does not implement the input filtering hooks for ext/filter, which allows remote malicious users to bypass web site filters via an application/vnd.fdf formatted POST.
Php Php 5.1.5
Php Php 5.1.2
Php Php 5.1.1
Php Php 5.1.6
Php Php 5.0
Php Php 5.0.5
Php Php 5.0.1
Php Php 5.1.4
Php Php 5.0.4
Php Php 5.0.3
Php Php 5.1.0
Php Php 5.2.0
Php Php 5.1.3
Php Php 5.0.2
Php Php 5.0.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »