Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php pear 0.2.2 vulnerabilities and exploits
(subscribe to this query)
294
VMScore
CVE-2011-1072
The installer in PEAR prior to 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
Php Pear 0.9
Php Pear 1.3.4
Php Pear 1.2.1
Php Pear 1.3.3.1
Php Pear 1.4.2
Php Pear 1.0.1
Php Pear 1.0
Php Pear 1.2
Php Pear 1.5.0
Php Pear 1.3
Php Pear 0.90
Php Pear 1.5.1
Php Pear 1.4.0
Php Pear 1.4.1
Php Pear 1.3.5
Php Pear
Php Pear 1.3.6
Php Pear 1.3.3
Php Pear 1.3.1
Php Pear 0.2.2
Php Pear 0.10
Php Pear 1.6.1
294
VMScore
CVE-2011-1144
The installer in PEAR 1.9.2 and previous versions allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists be...
Php Pear 0.9
Php Pear 1.3.4
Php Pear 1.2.1
Php Pear
Php Pear 1.3.3.1
Php Pear 1.4.2
Php Pear 1.0.1
Php Pear 1.0
Php Pear 1.2
Php Pear 1.5.0
Php Pear 1.3
Php Pear 0.90
Php Pear 1.5.1
Php Pear 1.9.1
Php Pear 1.4.0
Php Pear 1.4.1
Php Pear 1.3.5
Php Pear 1.3.6
Php Pear 1.3.3
Php Pear 1.3.1
Php Pear 0.2.2
Php Pear 0.10
668
VMScore
CVE-2006-0144
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote malicious users to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify functi...
Apache2triad Apache2triad
Php Pear 0.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6267
XML injection
CVE-2024-37673
CVE-2024-6266
CVE-2024-30078
arbitrary
CVE-2024-36886
CVE-2024-5346
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started