Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 4.3.0 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2009-2626
The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and previous versions versions allows context-specific malicious users to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then usin...
Php Php 4.3.6
Php Php 4.3.5
Php Php 4.3.0
Php Php 5.0.0
Php Php 4.3.7
Php Php 4.4.4
Php Php 5.1.0
Php Php 5.0.2
Php Php 4.2
Php Php 4.4.9
Php Php 3.0.12
Php Php 3.0.1
Php Php 3.0.14
Php Php 3.0.17
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0
Php Php 4.0.2
Php Php 4.0.1
Php Php 4.1.2
Php Php 4.0.7
Php Php 5.2.8
3 EDB exploits
6.4
CVSSv2
CVE-2008-7068
The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent malicious users to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database e...
Php Php 4.1.0
Php Php 4.0.0
Php Php 4.0
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.3.4
Php Php 4.3.3
Php Php 4.2.2
Php Php 4.3.0
Php Php 4.3.8
Php Php 4.3.9
Php Php 4.2.0
Php Php 4.0.1
Php Php 4.0.5
Php Php 4.0.4
Php Php 4.3.2
Php Php 4.3.11
Php Php 4.2
Php Php 4.4.9
Php Php 4.3.7
Php Php 4.4.4
Php Php 5.2.6
6.4
CVSSv2
CVE-2006-1015
Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote malicious users to read and create arbitrary files via the sendmail -...
Php Php 3.0.13
Php Php 3.0.14
Php Php 3.0.4
Php Php 3.0.5
Php Php 3.0.6
Php Php 4.0.1
Php Php 4.0.2
Php Php 4.0.7
Php Php 4.2.3
Php Php 4.2
Php Php 4.3.4
Php Php 4.3.5
Php Php 4.4.2
Php Php 5.0.0
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.17
Php Php 3.0.18
1 EDB exploit
6.2
CVSSv2
CVE-2006-5178
Race condition in the symlink function in PHP 5.1.6 and previous versions allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by...
Php Php 4.0.1
Php Php 4.0.7
Php Php 4.2.1
Php Php 4.2.2
Php Php 4.3.3
Php Php 4.3.4
Php Php 4.4.1
Php Php 4.4.2
Php Php 5.0.4
Php Php 5.0.5
Php Php 5.1.4
Php Php 5.1.5
Php Php 4.0
Php Php 4.0.5
Php Php 4.0.6
Php Php 4.1.2
Php Php 4.2.0
Php Php 4.3.11
Php Php 4.3.2
Php Php 4.3.9
Php Php 4.4.0
Php Php 5.0.2
1 EDB exploit
1 Github repository
6
CVSSv2
CVE-2017-6543
Tenable Nessus prior to 6.10.2 (as used alone or in Tenable Appliance prior to 4.5.0) was found to contain a flaw that allowed a remote, authenticated malicious user to upload a crafted file that could be written to anywhere on the system. This could be used to subsequently gain ...
Tenable Nessus
Tenable Appliance 4.4.0
6
CVSSv2
CVE-2010-3716
The be_user_creation task in TYPO3 4.2.x prior to 4.2.15 and 4.3.x prior to 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships.
Typo3 Typo3 4.2.1
Typo3 Typo3 4.2.4
Typo3 Typo3 4.2.10
Typo3 Typo3 4.2.11
Typo3 Typo3 4.2.8
Typo3 Typo3 4.2.0
Typo3 Typo3 4.2.13
Typo3 Typo3 4.3.0
Typo3 Typo3 4.2.3
Typo3 Typo3 4.2.5
Typo3 Typo3 4.2.6
Typo3 Typo3 4.2.7
Typo3 Typo3 4.3.1
Typo3 Typo3 4.3.2
Typo3 Typo3 4.3.3
Typo3 Typo3 4.3.4
Typo3 Typo3 4.3.5
Typo3 Typo3 4.2.9
Typo3 Typo3 4.2.2
Typo3 Typo3 4.2.12
Typo3 Typo3 4.2.14
Typo3 Typo3 4.3.6
5.1
CVSSv2
CVE-2008-4107
The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce cryptographically strong random numbers, which allows malicious users to leverage exposures in products that rely on these functions for security-relevant functionality, as demonstrated by the password-reset funct...
Php Php 4.4.7
Php Php 4.3.9
Php Php 4.3.8
Php Php 4.3.11
Php Php 4.3.10
Php Php 4.2.1
Php Php 4.0
Php Php 4.0.4
Php Php 4.0.3
Php Php 4.4.6
Php Php 4.4.5
Php Php 4.3.7
Php Php 4.3.6
Php Php 4.3.1
Php Php 4.3.0
Php Php 4.1.0
Php Php 4.1.2
Php Php 4.0.7
Php Php 4.0.2
Php Php 4.0.1
Php Php 4.4.1
Php Php 4.4.0
5.1
CVSSv2
CVE-2007-2510
Buffer overflow in the make_http_soap_request function in PHP prior to 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
Php Php 4.0.0
Php Php 4.0.1
Php Php 4.0.4
Php Php 4.0.5
Php Php 4.1.1
Php Php 4.1.2
Php Php 4.3.11
Php Php 4.3.2
Php Php 4.3.9
Php Php 4.4.0
Php Php 5.0.0
Php Php 5.0.1
Php Php 5.0.2
Php Php 5.1.0
Php Php 5.1.1
Php Php 5.2.1
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.1.0
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.7
5.1
CVSSv2
CVE-2007-1378
The ovrimos_longreadlen function in the Ovrimos extension for PHP prior to 4.4.5 allows context-dependent malicious users to write to arbitrary memory locations via the result_id and length arguments.
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.12
Php Php 3.0.13
Php Php 3.0.9
Php Php 4.0
Php Php 4.0.0
Php Php 4.0.1
Php Php 4.3.10
Php Php 4.3.11
Php Php 4.3.2
Php Php 4.3.3
Php Php 3.0
Php Php 3.0.15
Php Php 3.0.17
Php Php 3.0.5
Php Php 3.0.7
Php Php 4.0.3
Php Php 4.0.7
Php Php 4.2.3
Php Php 4.3.0
Php Php 4.3.5
5.1
CVSSv2
CVE-2007-1379
The ovrimos_close function in the Ovrimos extension for PHP prior to 4.4.5 can trigger efree of an arbitrary address, which might allow context-dependent malicious users to execute arbitrary code.
Php Php 3.0.1
Php Php 3.0.10
Php Php 3.0.11
Php Php 3.0.12
Php Php 3.0.8
Php Php 3.0.9
Php Php 4.0
Php Php 4.0.0
Php Php 4.0.7
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.11
Php Php 4.3.2
Php Php 3.0
Php Php 3.0.13
Php Php 3.0.15
Php Php 3.0.5
Php Php 3.0.7
Php Php 4.0.1
Php Php 4.0.3
Php Php 4.0.6
Php Php 4.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »