Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-5016

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-12 Nov, 2010 | 21:00
Updated At-07 Aug, 2024 | 07:24
Rejected At-
Credits

Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:12 Nov, 2010 | 21:00
Updated At:07 Aug, 2024 | 07:24
Rejected At:
▼CVE Numbering Authority (CNA)

Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2011/0077
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/44889
vdb-entry
x_refsource_BID
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/42812
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2011-0195.html
vendor-advisory
x_refsource_REDHAT
http://bugs.php.net/bug.php?id=49687
x_refsource_CONFIRM
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
x_refsource_MISC
http://www.ubuntu.com/usn/USN-1042-1
vendor-advisory
x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2010-0919.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0021
vdb-entry
x_refsource_VUPEN
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
x_refsource_MISC
http://secunia.com/advisories/42410
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
vendor-advisory
x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0020
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2010/3081
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2011/0077
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/44889
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/42812
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0195.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://bugs.php.net/bug.php?id=49687
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
Resource:
x_refsource_MISC
Hyperlink: http://www.ubuntu.com/usn/USN-1042-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0919.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2011/0021
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/42410
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.vupen.com/english/advisories/2011/0020
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2010/3081
Resource:
vdb-entry
x_refsource_VUPEN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.vupen.com/english/advisories/2011/0077
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/44889
vdb-entry
x_refsource_BID
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/42812
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-0195.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://bugs.php.net/bug.php?id=49687
x_refsource_CONFIRM
x_transferred
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
x_refsource_MISC
x_transferred
http://www.ubuntu.com/usn/USN-1042-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.redhat.com/support/errata/RHSA-2010-0919.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2011/0021
vdb-entry
x_refsource_VUPEN
x_transferred
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/42410
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.vupen.com/english/advisories/2011/0020
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2010/3081
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0077
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/44889
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/42812
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0195.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://bugs.php.net/bug.php?id=49687
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1042-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0919.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0021
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/42410
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0020
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/3081
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:12 Nov, 2010 | 22:00
Updated At:11 Apr, 2025 | 00:51

Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>php>>Versions up to 5.2.10(inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
The PHP Group
php
>>php>>1.0
cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>2.0
cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>2.0b10
cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.1
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.2
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.3
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.4
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.5
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.6
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.7
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.8
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.9
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.10
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.11
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.12
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.13
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.14
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.15
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.16
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.17
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.18
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.0
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.2
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.5
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.6
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.0
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.1
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.2
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.0
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.1
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.2
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.3
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.0
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.1
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.2
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.3
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.4
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.5
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.php.net/bug.php?id=49687cve@mitre.org
Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.htmlcve@mitre.org
N/A
http://secunia.com/advisories/42410cve@mitre.org
N/A
http://secunia.com/advisories/42812cve@mitre.org
N/A
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.htmlcve@mitre.org
Exploit
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdfcve@mitre.org
Exploit
http://www.redhat.com/support/errata/RHSA-2010-0919.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2011-0195.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/44889cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-1042-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2010/3081cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0020cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0021cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0077cve@mitre.org
N/A
http://bugs.php.net/bug.php?id=49687af854a3a-2127-422b-91ae-364da2661108
Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42410af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42812af854a3a-2127-422b-91ae-364da2661108
N/A
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdfaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.redhat.com/support/errata/RHSA-2010-0919.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-0195.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/44889af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-1042-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/3081af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0020af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0021af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0077af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://bugs.php.net/bug.php?id=49687
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/42410
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/42812
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0919.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0195.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/44889
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1042-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/3081
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0020
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0021
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0077
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://bugs.php.net/bug.php?id=49687
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/42410
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/42812
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.redhat.com/support/errata/RHSA-2010-0919.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-0195.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/44889
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1042-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/3081
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0020
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0021
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0077
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2007-3378
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-4.22% / 88.29%
||
7 Day CHG~0.00%
Published-29 Jun, 2007 | 18:00
Updated-07 Aug, 2024 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-264
Not Available
CVE-2007-3806
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-4.75% / 89.01%
||
7 Day CHG~0.00%
Published-17 Jul, 2007 | 00:00
Updated-07 Aug, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2007-4010
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-3.55% / 87.22%
||
7 Day CHG~0.00%
Published-26 Jul, 2007 | 00:00
Updated-07 Aug, 2024 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-4507
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-3.37% / 86.85%
||
7 Day CHG~0.00%
Published-23 Aug, 2007 | 19:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in the php_ntuser component for PHP 5.2.3 allow context-dependent attackers to cause a denial of service or execute arbitrary code via long arguments to the (1) ntuser_getuserlist, (2) ntuser_getuserinfo, (3) ntuser_getusergroups, or (4) ntuser_getdomaincontroller functions.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-3996
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-6.31% / 90.58%
||
7 Day CHG~0.00%
Published-04 Sep, 2007 | 18:00
Updated-07 Aug, 2024 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-189
Not Available
CVE-2007-2872
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-17.12% / 94.74%
||
7 Day CHG~0.00%
Published-04 Jun, 2007 | 17:00
Updated-07 Aug, 2024 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-189
Not Available
CVE-2007-1711
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-20.85% / 95.40%
||
7 Day CHG~0.00%
Published-27 Mar, 2007 | 01:00
Updated-07 Aug, 2024 | 13:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-1886
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.65% / 69.82%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-07 Aug, 2024 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an "off by one overflow."

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-1583
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-17.12% / 94.74%
||
7 Day CHG~0.00%
Published-21 Mar, 2007 | 23:00
Updated-07 Aug, 2024 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-1411
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-11.60% / 93.38%
||
7 Day CHG~0.00%
Published-10 Mar, 2007 | 22:00
Updated-07 Aug, 2024 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2007-1396
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-1.99% / 82.86%
||
7 Day CHG~0.00%
Published-10 Mar, 2007 | 22:00
Updated-07 Aug, 2024 | 12:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2020-28948
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-70.34% / 98.62%
||
7 Day CHG~0.00%
Published-19 Nov, 2020 | 18:14
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectThe PHP GroupThe Drupal Association
Product-debian_linuxfedoradrupalarchive_tarn/a
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2015-7803
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-19.12% / 95.11%
||
7 Day CHG~0.00%
Published-11 Dec, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.

Action-Not Available
Vendor-n/aThe PHP GroupApple Inc.
Product-mac_os_xphpn/a
CVE-2015-3330
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-24.17% / 95.86%
||
7 Day CHG~0.00%
Published-09 Jun, 2015 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP GroupApple Inc.Oracle Corporation
Product-enterprise_linuxenterprise_linux_serversolarisenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_euslinuxmac_os_xn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-2325
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.66% / 70.21%
||
7 Day CHG~0.00%
Published-14 Jan, 2020 | 16:46
Updated-06 Aug, 2024 | 05:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.

Action-Not Available
Vendor-pcren/aMariaDB FoundationopenSUSEThe PHP Group
Product-opensusephpmariadbpcren/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2015-2305
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-20.92% / 95.41%
||
7 Day CHG-5.12%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.

Action-Not Available
Vendor-rxspencer_projectn/aopenSUSEThe PHP GroupDebian GNU/LinuxCanonical Ltd.
Product-opensuseubuntu_linuxrxspencerphpdebian_linuxn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • Next
Details not found