Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-2509

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-09 May, 2007 | 00:00
Updated At-07 Aug, 2024 | 13:42
Rejected At-
Credits

CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:09 May, 2007 | 00:00
Updated At:07 Aug, 2024 | 13:42
Rejected At:
▼CVE Numbering Authority (CNA)

CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/25660
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/25187
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25191
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-462-1
vendor-advisory
x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2007/2187
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0888.html
vendor-advisory
x_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/26048
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2007/dsa-1296
vendor-advisory
x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2007-0355.html
vendor-advisory
x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-200705-19.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/26967
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/27351
third-party-advisory
x_refsource_SECUNIA
http://www.trustix.org/errata/2007/0017/
vendor-advisory
x_refsource_TRUSTIX
http://www.securityfocus.com/bid/23818
vdb-entry
x_refsource_BID
http://www.securityfocus.com/bid/23813
vdb-entry
x_refsource_BID
http://us2.php.net/releases/4_4_7.php
x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2007-0349.html
vendor-advisory
x_refsource_REDHAT
http://www.debian.org/security/2007/dsa-1295
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/25318
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
vdb-entry
x_refsource_XF
http://www.securityfocus.com/archive/1/463596/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://rhn.redhat.com/errata/RHSA-2007-0889.html
vendor-advisory
x_refsource_REDHAT
http://us2.php.net/releases/5_2_2.php
x_refsource_CONFIRM
http://secunia.com/advisories/25365
third-party-advisory
x_refsource_SECUNIA
http://securityreason.com/securityalert/2672
third-party-advisory
x_refsource_SREASON
http://secunia.com/advisories/25255
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25445
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
x_refsource_CONFIRM
http://secunia.com/advisories/25372
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
vdb-entry
signature
x_refsource_OVAL
http://www.securitytracker.com/id?1018022
vdb-entry
x_refsource_SECTRACK
https://rhn.redhat.com/errata/RHSA-2007-0348.html
vendor-advisory
x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/25660
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/25187
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25191
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-462-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.vupen.com/english/advisories/2007/2187
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0888.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/26048
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2007/dsa-1296
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0355.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/26967
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/27351
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2007/0017/
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.securityfocus.com/bid/23818
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/bid/23813
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://us2.php.net/releases/4_4_7.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0349.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.debian.org/security/2007/dsa-1295
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/25318
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.securityfocus.com/archive/1/463596/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0889.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://us2.php.net/releases/5_2_2.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25365
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securityreason.com/securityalert/2672
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://secunia.com/advisories/25255
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25445
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/25372
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securitytracker.com/id?1018022
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://rhn.redhat.com/errata/RHSA-2007-0348.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/25660
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/25187
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25191
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-462-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.vupen.com/english/advisories/2007/2187
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0888.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/26048
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2007/dsa-1296
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0355.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://security.gentoo.org/glsa/glsa-200705-19.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/26967
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/27351
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.trustix.org/errata/2007/0017/
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.securityfocus.com/bid/23818
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/bid/23813
vdb-entry
x_refsource_BID
x_transferred
http://us2.php.net/releases/4_4_7.php
x_refsource_CONFIRM
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0349.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.debian.org/security/2007/dsa-1295
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/25318
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
vdb-entry
x_refsource_XF
x_transferred
http://www.securityfocus.com/archive/1/463596/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://rhn.redhat.com/errata/RHSA-2007-0889.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://us2.php.net/releases/5_2_2.php
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25365
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securityreason.com/securityalert/2672
third-party-advisory
x_refsource_SREASON
x_transferred
http://secunia.com/advisories/25255
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25445
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/25372
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securitytracker.com/id?1018022
vdb-entry
x_refsource_SECTRACK
x_transferred
https://rhn.redhat.com/errata/RHSA-2007-0348.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/25660
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/25187
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25191
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-462-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2187
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0888.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/26048
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2007/dsa-1296
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0355.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-19.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/26967
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/27351
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2007/0017/
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.securityfocus.com/bid/23818
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/bid/23813
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://us2.php.net/releases/4_4_7.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0349.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.debian.org/security/2007/dsa-1295
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/25318
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/463596/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0889.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://us2.php.net/releases/5_2_2.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25365
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securityreason.com/securityalert/2672
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://secunia.com/advisories/25255
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25445
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/25372
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018022
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://rhn.redhat.com/errata/RHSA-2007-0348.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:09 May, 2007 | 00:19
Updated At:30 Oct, 2018 | 16:25

CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.6LOW
AV:N/AC:H/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 2.6
Base severity: LOW
Vector:
AV:N/AC:H/Au:N/C:N/I:P/A:N
CPE Matches

The PHP Group
php
>>php>>4.0.0
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.2
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.5
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.6
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.0
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.1
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.2
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.0
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.1
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.2
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.3
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.0
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.1
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.2
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.3
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.4
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.5
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.6
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.7
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.8
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.9
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.10
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.11
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.0
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.1
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.2
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.3
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.4
cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.5
cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.4.6
cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.0
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.1
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.2
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.3
cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.4
cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.5
cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2007-0889.htmlcve@mitre.org
N/A
http://secunia.com/advisories/25187cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/25191cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/25255cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/25318cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/25365cve@mitre.org
N/A
http://secunia.com/advisories/25372cve@mitre.org
N/A
http://secunia.com/advisories/25445cve@mitre.org
N/A
http://secunia.com/advisories/25660cve@mitre.org
N/A
http://secunia.com/advisories/26048cve@mitre.org
N/A
http://secunia.com/advisories/26967cve@mitre.org
N/A
http://secunia.com/advisories/27351cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200705-19.xmlcve@mitre.org
N/A
http://securityreason.com/securityalert/2672cve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2007-231.htmcve@mitre.org
N/A
http://us2.php.net/releases/4_4_7.phpcve@mitre.org
N/A
http://us2.php.net/releases/5_2_2.phpcve@mitre.org
N/A
http://www.debian.org/security/2007/dsa-1295cve@mitre.org
N/A
http://www.debian.org/security/2007/dsa-1296cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:103cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-0349.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-0355.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2007-0888.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/463596/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/23813cve@mitre.org
N/A
http://www.securityfocus.com/bid/23818cve@mitre.org
Patch
http://www.securitytracker.com/id?1018022cve@mitre.org
N/A
http://www.trustix.org/errata/2007/0017/cve@mitre.org
N/A
http://www.ubuntu.com/usn/usn-462-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/2187cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34413cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839cve@mitre.org
N/A
https://rhn.redhat.com/errata/RHSA-2007-0348.htmlcve@mitre.org
N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0889.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25187
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25191
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25255
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25318
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/25365
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25372
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25445
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25660
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/26048
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/26967
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/27351
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200705-19.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/2672
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://us2.php.net/releases/4_4_7.php
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://us2.php.net/releases/5_2_2.php
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2007/dsa-1295
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2007/dsa-1296
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0349.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0355.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0888.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/463596/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/23813
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/23818
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.securitytracker.com/id?1018022
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2007/0017/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-462-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2187
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34413
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10839
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://rhn.redhat.com/errata/RHSA-2007-0348.html
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

93Records found

CVE-2014-9653
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.74% / 87.55%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.

Action-Not Available
Vendor-file_projectn/aDebian GNU/LinuxThe PHP Group
Product-filedebian_linuxphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-5120
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-4.05% / 88.06%
||
7 Day CHG~0.00%
Published-23 Aug, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-4153
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-5.31% / 89.65%
||
7 Day CHG~0.00%
Published-18 Jan, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP 5.3.8 does not always check the return value of the zend_strndup function, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that performs strndup operations on untrusted string data, as demonstrated by the define function in zend_builtin_functions.c, and unspecified functions in ext/soap/php_sdl.c, ext/standard/syslog.c, ext/standard/browscap.c, ext/oci8/oci8.c, ext/com_dotnet/com_typeinfo.c, and main/php_open_temporary_file.c.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4071
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-25.49% / 96.01%
||
7 Day CHG~0.00%
Published-20 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.

Action-Not Available
Vendor-n/aThe PHP GroupApple Inc.
Product-mac_os_xphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-3710
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-4.49% / 88.68%
||
7 Day CHG~0.00%
Published-05 Nov, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.

Action-Not Available
Vendor-n/aThe PHP GroupDebian GNU/LinuxCanonical Ltd.
Product-debian_linuxubuntu_linuxphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-3487
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-15.21% / 94.34%
||
7 Day CHG~0.00%
Published-09 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.

Action-Not Available
Vendor-file_projectn/aopenSUSEThe PHP GroupDebian GNU/LinuxOracle Corporation
Product-opensusefilephpdebian_linuxlinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-21705
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-4.3||MEDIUM
EPSS-0.23% / 45.78%
||
7 Day CHG~0.00%
Published-04 Oct, 2021 | 04:00
Updated-17 Sep, 2024 | 04:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect URL validation in FILTER_VALIDATE_URL

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

Action-Not Available
Vendor-NetApp, Inc.Oracle CorporationThe PHP Group
Product-clustered_data_ontapsd-wan_awarephpPHP
CWE ID-CWE-20
Improper Input Validation
CVE-2013-7327
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.59% / 68.12%
||
7 Day CHG~0.00%
Published-18 Feb, 2014 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.

Action-Not Available
Vendor-n/aThe PHP GroupCanonical Ltd.
Product-ubuntu_linuxphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-3735
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.34% / 55.69%
||
7 Day CHG~0.00%
Published-31 May, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4248
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-4.99% / 89.29%
||
7 Day CHG~0.00%
Published-18 Aug, 2013 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP GroupCanonical Ltd.
Product-enterprise_linuxubuntu_linuxphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-4885
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-88.99% / 99.50%
||
7 Day CHG~0.00%
Published-30 Dec, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-1019
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-8.11% / 91.80%
||
7 Day CHG~0.00%
Published-22 Dec, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.

Action-Not Available
Vendor-trustixopenpkgn/aUbuntuThe PHP Group
Product-phpopenpkgsecure_linuxubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-4388
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.94% / 75.31%
||
7 Day CHG-1.28%
Published-07 Sep, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.The PHP Group
Product-debian_linuxphpubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7071
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-5.3||MEDIUM
EPSS-3.89% / 87.79%
||
7 Day CHG~0.00%
Published-15 Feb, 2021 | 04:10
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FILTER_VALIDATE_URL accepts URLs with invalid userinfo

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

Action-Not Available
Vendor-NetApp, Inc.Debian GNU/LinuxThe PHP Group
Product-clustered_data_ontapdebian_linuxphpPHP
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7070
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-4.3||MEDIUM
EPSS-18.48% / 94.99%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 14:14
Updated-16 Sep, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHP parses encoded cookie names so malicious `__Host-` cookies can be sent

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.

Action-Not Available
Vendor-Tenable, Inc.openSUSEFedora ProjectNetApp, Inc.Canonical Ltd.Debian GNU/LinuxThe PHP Group
Product-ubuntu_linuxclustered_data_ontapphpdebian_linuxfedoratenable.scleapPHP
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-565
Reliance on Cookies without Validation and Integrity Checking
CVE-2020-7069
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-5.4||MEDIUM
EPSS-7.08% / 91.15%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 14:14
Updated-17 Sep, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.

Action-Not Available
Vendor-Tenable, Inc.Oracle CorporationopenSUSEFedora ProjectNetApp, Inc.Canonical Ltd.Debian GNU/LinuxThe PHP Group
Product-communications_diameter_signaling_routerubuntu_linuxphpclustered_data_ontapdebian_linuxfedoratenable.scleapPHP
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2012-2336
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-9.66% / 92.59%
||
7 Day CHG~0.00%
Published-11 May, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-6497
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-2.92% / 85.86%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:49
Updated-06 Aug, 2024 | 07:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.

Action-Not Available
Vendor-magenton/aThe PHP Group
Product-magentophpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-1172
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.8||MEDIUM
EPSS-18.17% / 94.94%
||
7 Day CHG~0.00%
Published-24 May, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-4598
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.54% / 66.63%
||
7 Day CHG~0.00%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP Group
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_eusn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0788
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-11.46% / 93.33%
||
7 Day CHG~0.00%
Published-14 Feb, 2012 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-1734
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 18.53%
||
7 Day CHG-0.00%
Published-30 Mar, 2025 | 05:43
Updated-02 Jul, 2025 | 20:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Streams HTTP wrapper does not fail for headers with invalid name and no colon

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.

Action-Not Available
Vendor-The PHP GroupNetApp, Inc.
Product-phpontapPHP
CWE ID-CWE-20
Improper Input Validation
CVE-2025-1736
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.85%
||
7 Day CHG-0.01%
Published-30 Mar, 2025 | 05:49
Updated-02 Jul, 2025 | 20:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stream HTTP wrapper header check might omit basic auth header

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.

Action-Not Available
Vendor-The PHP GroupNetApp, Inc.
Product-phpontapPHP
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0831
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-9.76% / 92.64%
||
7 Day CHG~0.00%
Published-10 Feb, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-1217
Matching Score-6
Assigner-PHP Group
ShareView Details
Matching Score-6
Assigner-PHP Group
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 19.86%
||
7 Day CHG-0.00%
Published-29 Mar, 2025 | 05:19
Updated-23 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Header parser of http stream wrapper does not handle folded headers

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.

Action-Not Available
Vendor-The PHP Group
Product-phpPHP
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-436
Interpretation Conflict
CVE-2017-7189
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.18% / 77.87%
||
7 Day CHG+0.03%
Published-10 Jul, 2019 | 14:41
Updated-05 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4636
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.36% / 57.69%
||
7 Day CHG~0.00%
Published-21 Jun, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mget function in libmagic/softmagic.c in the Fileinfo component in PHP 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via an MP3 file that triggers incorrect MIME type detection during access to an finfo object.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-7209
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.3||MEDIUM
EPSS-6.82% / 90.95%
||
7 Day CHG~0.00%
Published-10 Nov, 2016 | 06:16
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Edge allows remote attackers to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-edgen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-6877
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.78% / 72.70%
||
7 Day CHG~0.00%
Published-05 May, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Citrix XenMobile Server before 10.5.0.24 allows man-in-the-middle attackers to trigger HTTP 302 redirections via vectors involving the HTTP Host header and a cached page. NOTE: the vendor reports "our internal analysis of this issue concluded that this was not a valid vulnerability" because an exploitation scenario would involve a man-in-the-middle attack against a TLS session

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-xenmobile_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-7094
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-2.6||LOW
EPSS-0.34% / 55.79%
||
7 Day CHG~0.00%
Published-11 Dec, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CFNetwork HTTPProtocol in Apple iOS before 9.2 and OS X before 10.11.2 allows man-in-the-middle attackers to bypass the HSTS protection mechanism via a crafted URL.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osmac_os_xn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-3455
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-2.11% / 83.39%
||
7 Day CHG~0.00%
Published-18 May, 2015 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.

Action-Not Available
Vendor-n/aFedora ProjectSquid CacheOracle Corporation
Product-squidfedorasolarislinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-5375
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-0.37% / 58.24%
||
7 Day CHG~0.00%
Published-11 Oct, 2007 | 10:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Interpretation conflict in the Sun Java Virtual Machine (JVM) allows user-assisted remote attackers to conduct a multi-pin DNS rebinding attack and execute arbitrary JavaScript in an intranet context, when an intranet web server has an HTML document that references a "mayscript=true" Java applet through a local relative URI, which may be associated with different IP addresses by the browser and the JVM.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-java_virtual_machinen/a
CWE ID-CWE-16
Not Available
CWE ID-CWE-20
Improper Input Validation
CVE-2015-1835
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.62% / 69.26%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-cordovan/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9263
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-1.00% / 76.08%
||
7 Day CHG~0.00%
Published-12 Oct, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file.

Action-Not Available
Vendor-n/aWordPress.org
Product-wordpressn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2006-2920
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-1.10% / 77.19%
||
7 Day CHG~0.00%
Published-09 Jun, 2006 | 01:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sylpheed-Claws before 2.2.2 and Sylpheed before 2.2.6 allow remote attackers to bypass the URI check functionality and makes it easier to conduct phishing attacks via a URI that begins with a space character.

Action-Not Available
Vendor-sylpheed-clawssylpheedn/a
Product-sylpheed-clawssylpheedn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2006-1192
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-2.6||LOW
EPSS-30.14% / 96.51%
||
7 Day CHG-2.89%
Published-11 Apr, 2006 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626.

Action-Not Available
Vendor-n/aCanon Inc.Microsoft Corporation
Product-network_camera_server_vb101internet_explorerien/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3739
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-1.07% / 76.81%
||
7 Day CHG-0.01%
Published-20 May, 2016 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate.

Action-Not Available
Vendor-n/aCURL
Product-curln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-2037
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.6||LOW
EPSS-0.49% / 64.64%
||
7 Day CHG~0.00%
Published-18 Jan, 2014 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Action-Not Available
Vendor-httplib2_projectn/aCanonical Ltd.
Product-httplib2ubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-3587
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-0.16% / 36.93%
||
7 Day CHG+0.01%
Published-19 Jun, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-advanced_package_tooln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24905
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.39% / 59.37%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 14:05
Updated-23 Apr, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Argo CD login screen allows message spoofing if SSO is enabled

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. A vulnerability was found in Argo CD prior to versions 2.3.4, 2.2.9, and 2.1.15 that allows an attacker to spoof error messages on the login screen when single sign on (SSO) is enabled. In order to exploit this vulnerability, an attacker would have to trick the victim to visit a specially crafted URL which contains the message to be displayed. As far as the research of the Argo CD team concluded, it is not possible to specify any active content (e.g. Javascript) or other HTML fragments (e.g. clickable links) in the spoofed message. A patch for this vulnerability has been released in Argo CD versions 2.3.4, 2.2.9, and 2.1.15. There are currently no known workarounds.

Action-Not Available
Vendor-argoprojargoproj
Product-argo_cdargo-cd
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0954
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-2.6||LOW
EPSS-0.37% / 58.03%
||
7 Day CHG~0.00%
Published-19 Jun, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-advanced_package_tooln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-15136
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.06%
||
7 Day CHG~0.00%
Published-29 Jan, 2019 | 23:00
Updated-05 Aug, 2024 | 09:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TitanHQ SpamTitan before 7.01 has Improper input validation. This allows internal attackers to bypass the anti-spam filter to send malicious emails to an entire organization by modifying the URL requests sent to the application.

Action-Not Available
Vendor-titanhqn/a
Product-spamtitann/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-3872
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.6||LOW
EPSS-2.78% / 85.49%
||
7 Day CHG~0.00%
Published-27 Oct, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."

Action-Not Available
Vendor-n/aPerforce Software, Inc. ("Puppet")
Product-puppetpuppet_enterprise_userspuppet_enterprisen/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found