Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 7.0.3 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2016-6292
The exif_process_user_comment function in ext/exif/exif.c in PHP prior to 5.5.38, 5.6.x prior to 5.6.24, and 7.x prior to 7.0.9 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
Php Php 5.6.1
Php Php 5.6.0
Php Php 5.6.5
Php Php 7.0.4
Php Php 5.6.12
Php Php 5.6.13
Php Php 5.6.4
Php Php 7.0.3
Php Php 5.6.6
Php Php 7.0.1
Php Php 5.6.18
Php Php 5.6.11
Php Php 5.6.2
Php Php 5.6.10
Php Php
Php Php 5.6.7
Php Php 5.6.21
Php Php 5.6.15
Php Php 5.6.20
Php Php 7.0.2
Php Php 5.6.17
Php Php 5.6.16
2.1
CVSSv2
CVE-2019-1600
A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local malicious user to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implemen...
Cisco Firepower Extensible Operating System
Cisco Nx-os
2.1
CVSSv2
CVE-2014-0103
WebAccess in Zarafa prior to 7.1.10 and WebApp prior to 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.
Fedoraproject Fedora 19
Zarafa Zarafa 7.0.10
Zarafa Zarafa 7.0.12
Zarafa Zarafa 7.0.7
Zarafa Zarafa 7.0.9
Zarafa Webapp
Zarafa Zarafa
Zarafa Zarafa 7.0
Zarafa Zarafa 7.0.1
Zarafa Zarafa 7.1.1
Zarafa Zarafa 7.0.2
Zarafa Zarafa 7.0.3
Zarafa Zarafa 7.0.4
Zarafa Zarafa 7.0.5
Zarafa Zarafa 7.1.2
Zarafa Zarafa 7.1.3
Zarafa Zarafa 7.1.4
Fedoraproject Fedora 20
Zarafa Zarafa 7.0.11
Zarafa Zarafa 7.0.13
Zarafa Zarafa 7.0.6
Zarafa Zarafa 7.0.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5