Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 3.0.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-1777
Integer overflow in the zip_read_entry function in PHP 4 prior to 4.4.5 allows remote malicious users to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overfl...
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.18
Php Php 3.0.2
Php Php 3.0.9
Php Php 4.0.0
Php Php 4.0.4
Php Php 4.1.1
Php Php 4.1.2
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.7
Php Php 4.3.8
Php Php 3.0.11
Php Php 3.0.12
Php Php 3.0.3
Php Php 3.0.4
Php Php 4.0.1
Php Php 4.0.5
Php Php 4.0.6
Php Php 4.2.0
Php Php 4.2.1
1 EDB exploit
7.5
CVSSv2
CVE-2007-0906
Multiple buffer overflows in PHP prior to 5.2.1 allow malicious users to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, ...
Php Php 3.0.12
Php Php 3.0.13
Php Php 3.0.3
Php Php 3.0.4
Php Php 4.0.1
Php Php 4.0.7
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.18
Php Php 3.0.2
Php Php 3.0.9
Php Php 4.0
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.0.6
Php Php 4.1.2
Php Php 4.2.0
Php Php 4.3.10
Php Php 4.3.11
Php Php 4.3.9
Php Php 4.4.0
7.5
CVSSv2
CVE-2007-0909
Multiple format string vulnerabilities in PHP prior to 5.2.1 might allow malicious users to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.17
Php Php 3.0.18
Php Php 3.0.9
Php Php 4.0
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.1.1
Php Php 4.1.2
Php Php 4.3.10
Php Php 4.3.11
Php Php 4.3.8
Php Php 4.3.9
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.1
Php Php 5.1.2
Php Php 3.0.11
Php Php 3.0.12
Php Php 3.0.2
Php Php 3.0.3
7.5
CVSSv2
CVE-2007-0905
PHP prior to 5.2.1 allows malicious users to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.
Php Php 3.0
Php Php 3.0.1
Php Php 3.0.16
Php Php 3.0.17
Php Php 3.0.18
Php Php 3.0.8
Php Php 3.0.9
Php Php 4.0.3
Php Php 4.0.4
Php Php 4.1.1
Php Php 4.1.2
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.7
Php Php 4.3.8
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.2
7.5
CVSSv2
CVE-2006-6041
Multiple PHP remote file inclusion vulnerabilities in Laurent Van den Reysen WORK system e-commerce 3.0.2, and other versions prior to 3.0.4, allow remote malicious users to execute arbitrary PHP code via a URL in the g_include parameter to (1) index.php, (2) module/forum/forum.p...
Laurent Van Den Reysen Work System E-commerce
1 EDB exploit
7.5
CVSSv2
CVE-2005-3390
The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote malicious users to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS&...
Php Php 3.0.14
Php Php 3.0.15
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0.2
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.2.3
Php Php 4.2
Php Php 4.3.5
Php Php 4.3.6
Php Php 5.0.2
Php Php 5.0.3
Php Php 3.0
Php Php 3.0.1
Php Php 3.0.16
Php Php 3.0.17
Php Php 3.0.7
Php Php 3.0.8
Php Php 4.0.4
Php Php 4.1.0
Php Php 4.1.1
1 EDB exploit
7.5
CVSSv2
CVE-2005-3391
Multiple vulnerabilities in PHP prior to 4.4.1 allow remote malicious users to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.
Php Php 3.0
Php Php 3.0.1
Php Php 3.0.17
Php Php 3.0.18
Php Php 3.0.8
Php Php 3.0.9
Php Php 4.0.3
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.1.1
Php Php 4.1.2
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.7
Php Php 4.3.8
Php Php 4.3.9
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.12
Php Php 3.0.2
Php Php 3.0.3
Php Php 4.0.0
7.5
CVSSv2
CVE-2005-3392
Unspecified vulnerability in PHP prior to 4.4.1, when using the virtual function on Apache 2, allows remote malicious users to bypass safe_mode and open_basedir directives.
Php Php 3.0.12
Php Php 3.0.13
Php Php 3.0.3
Php Php 3.0.4
Php Php 3.0.14
Php Php 3.0.15
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0.2
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.2.3
Php Php 4.2
Php Php 4.3.5
Php Php 4.3.6
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.18
Php Php 3.0.2
Php Php 3.0.9
Php Php 4.0.0
Php Php 4.0.1
7.5
CVSSv2
CVE-2005-0511
misc.php for vBulletin 3.0.6 and previous versions, when "Add Template Name in HTML Comments" is enabled, allows remote malicious users to execute arbitrary PHP code via nested variables in the template parameter.
Jelsoft Vbulletin 2.2.0
Jelsoft Vbulletin 2.2.1
Jelsoft Vbulletin 2.2.2
Jelsoft Vbulletin 2.2.9 Can
Jelsoft Vbulletin 2.3.0
Jelsoft Vbulletin 3.0.1
Jelsoft Vbulletin 3.0.2
Jelsoft Vbulletin 2.0 Beta 2
Jelsoft Vbulletin 2.0 Beta 3
Jelsoft Vbulletin 2.2.7
Jelsoft Vbulletin 2.2.8
Jelsoft Vbulletin 3.0.0 Can4
Jelsoft Vbulletin 3.0.0 Rc4
Jelsoft Vbulletin 3.0 Beta 2
Jelsoft Vbulletin 2.0
Jelsoft Vbulletin 2.2.3
Jelsoft Vbulletin 2.2.4
Jelsoft Vbulletin 2.3.3
Jelsoft Vbulletin 2.3.4
Jelsoft Vbulletin 3.0.3
Jelsoft Vbulletin 3.0.4
Jelsoft Vbulletin 2.0.1
2 EDB exploits
7.5
CVSSv2
CVE-2004-1515
SQL injection vulnerability in (1) ttlast.php and (2) last10.php in vBulletin 3.0.x allows remote malicious users to execute arbitrary SQL statements via the fsel parameter, as demonstrated using last.php.
Jelsoft Vbulletin 3.0.0
Jelsoft Vbulletin 3.0.4
Jelsoft Vbulletin 3.0.5
Jelsoft Vbulletin 3.0.0 Beta 2
Jelsoft Vbulletin 3.0.0 Can4
Jelsoft Vbulletin 3.0.6
Jelsoft Vbulletin 3.0 Beta 2
Jelsoft Vbulletin 3.0.0 Rc4
Jelsoft Vbulletin 3.0.1
Jelsoft Vbulletin 3.0.2
Jelsoft Vbulletin 3.0.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2024-5274
CVE-2020-17519
CVE-2024-35340
CVE-2021-47558
local
XML injection
CVE-2021-47519
CVE-2021-47543
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »