Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 4.2 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2007-0123
Unrestricted file upload vulnerability in Uber Uploader 4.2 allows remote malicious users to upload and execute arbitrary PHP scripts by naming them with a .phtml extension, which bypasses the .php extension check but is still executable on some server configurations.
Uber Uploader Uber Uploader 4.2
6.8
CVSSv2
CVE-2006-6228
Cross-site scripting (XSS) vulnerability in Codewalkers ltwCalendar (aka PHP Event Calendar) prior to 4.2.1 allows remote malicious users to inject arbitrary HTML or web script via unknown vectors.
Codewalkers Ltwcalendar 4.1.3
Codewalkers Ltwcalendar 4.2
6.5
CVSSv2
CVE-2022-1103
The Advanced Uploader WordPress plugin up to and including 4.2 allows any authenticated users like subscriber to upload arbitrary files, such as PHP, which could lead to RCE
Advanced Uploader Project Advanced Uploader
6.5
CVSSv2
CVE-2019-19745
Contao 4.0 up to and including 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
Contao Contao 4.0
Contao Contao 4.1
Contao Contao 4.2
Contao Contao 4.3
Contao Contao
Contao Contao 4.5
Contao Contao 4.6
Contao Contao 4.7
6.5
CVSSv2
CVE-2019-10912
In Symfony prior to 2.8.50, 3.x prior to 3.4.26, 4.x prior to 4.1.12, and 4.2.x prior to 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. Th...
Sensiolabs Symfony
6.4
CVSSv2
CVE-2009-2626
The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and previous versions versions allows context-specific malicious users to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then usin...
Php Php 4.3.6
Php Php 4.3.5
Php Php 4.3.0
Php Php 5.0.0
Php Php 4.3.7
Php Php 4.4.4
Php Php 5.1.0
Php Php 5.0.2
Php Php 4.2
Php Php 4.4.9
Php Php 3.0.12
Php Php 3.0.1
Php Php 3.0.14
Php Php 3.0.17
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0
Php Php 4.0.2
Php Php 4.0.1
Php Php 4.1.2
Php Php 4.0.7
Php Php 5.2.8
3 EDB exploits
6.4
CVSSv2
CVE-2008-7068
The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent malicious users to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database e...
Php Php 4.1.0
Php Php 4.0.0
Php Php 4.0
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.3.4
Php Php 4.3.3
Php Php 4.2.2
Php Php 4.3.0
Php Php 4.3.8
Php Php 4.3.9
Php Php 4.2.0
Php Php 4.0.1
Php Php 4.0.5
Php Php 4.0.4
Php Php 4.3.2
Php Php 4.3.11
Php Php 4.2
Php Php 4.4.9
Php Php 4.3.7
Php Php 4.4.4
Php Php 5.2.6
6.4
CVSSv2
CVE-2006-2460
Sugar Suite Open Source (SugarCRM) 4.2 and previous versions, when register_globals is enabled, does not protect critical variables such as $_GLOBALS and $_SESSION from modification, which allows remote malicious users to conduct attacks such as directory traversal or PHP remote ...
Sugarcrm Sugarcrm 3.5
Sugarcrm Sugarcrm 4.0
Sugarcrm Sugarcrm 4.1
Sugarcrm Sugarcrm 4.2
1 EDB exploit
6.4
CVSSv2
CVE-2006-1015
Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote malicious users to read and create arbitrary files via the sendmail -...
Php Php 3.0.13
Php Php 3.0.14
Php Php 3.0.4
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0.1
Php Php 4.0.2
Php Php 4.0.7
Php Php 4.2.3
Php Php 4.2
Php Php 4.3.4
Php Php 4.3.5
Php Php 4.4.2
Php Php 5.0.0
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.17
Php Php 3.0.18
1 EDB exploit
6.4
CVSSv2
CVE-2005-3820
Multiple directory traversal vulnerabilities in index.php in vTiger CRM 4.2 and previous versions allow remote malicious users to read or include arbitrary files, an ultimately execute arbitrary PHP code, via .. (dot dot) and null byte ("%00") sequences in the (1) modul...
Vtiger Vtiger Crm
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »