Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.110184
Categoría:Web application abuses
Título:PHP < 5.2.4 Multiple Vulnerabilities
Resumen:PHP is prone to multiple vulnerabilities.
Descripción:Summary:
PHP is prone to multiple vulnerabilities.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-1413
BugTraq ID: 22893
http://www.securityfocus.com/bid/22893
https://www.exploit-db.com/exploits/3439
https://www.exploit-db.com/exploits/4204
http://retrogod.altervista.org/php_446_snmpget_local_bof.html
http://secunia.com/advisories/24440
XForce ISS Database: php-snmpget-function-bo(35517)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35517
Common Vulnerability Exposure (CVE) ID: CVE-2007-2872
1018186
http://www.securitytracker.com/id?1018186
2007-0023
http://www.trustix.org/errata/2007/0023/
20070601 SEC Consult SA-20070601-0 :: PHP chunk_split() integer overflow
http://www.securityfocus.com/archive/1/470244/100/0/threaded
24261
http://www.securityfocus.com/bid/24261
25456
http://secunia.com/advisories/25456
25535
http://secunia.com/advisories/25535
26048
http://secunia.com/advisories/26048
26231
http://secunia.com/advisories/26231
26838
http://secunia.com/advisories/26838
26871
http://secunia.com/advisories/26871
26895
http://secunia.com/advisories/26895
26930
http://secunia.com/advisories/26930
26967
http://secunia.com/advisories/26967
27037
http://secunia.com/advisories/27037
27102
http://secunia.com/advisories/27102
27110
http://secunia.com/advisories/27110
27351
http://secunia.com/advisories/27351
27377
http://secunia.com/advisories/27377
27545
http://secunia.com/advisories/27545
27864
http://secunia.com/advisories/27864
28318
http://secunia.com/advisories/28318
28658
http://secunia.com/advisories/28658
28750
http://secunia.com/advisories/28750
28936
http://secunia.com/advisories/28936
30040
http://secunia.com/advisories/30040
36083
http://osvdb.org/36083
ADV-2007-2061
http://www.vupen.com/english/advisories/2007/2061
ADV-2007-3386
http://www.vupen.com/english/advisories/2007/3386
ADV-2008-0059
http://www.vupen.com/english/advisories/2008/0059
ADV-2008-0398
http://www.vupen.com/english/advisories/2008/0398
FEDORA-2007-2215
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
FEDORA-2007-709
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
GLSA-200710-02
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPSBUX02308
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
HPSBUX02332
http://www.securityfocus.com/archive/1/491693/100/0/threaded
MDKSA-2007:187
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
OpenPKG-SA-2007.020
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
RHSA-2007:0888
http://www.redhat.com/support/errata/RHSA-2007-0888.html
RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
RHSA-2007:0890
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RHSA-2007:0891
http://www.redhat.com/support/errata/RHSA-2007-0891.html
SSA:2007-152-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
SSA:2008-045-03
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
SSRT071447
SSRT080010
SSRT080056
SUSE-SA:2007:044
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
SUSE-SA:2008:004
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
USN-549-1
https://usn.ubuntu.com/549-1/
USN-549-2
http://www.ubuntu.com/usn/usn-549-2
http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
http://www.php.net/ChangeLog-4.php
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_3.php
http://www.sec-consult.com/291.html
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://launchpad.net/bugs/173043
oval:org.mitre.oval:def:9424
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
php-chunksplit-security-bypass(39398)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
Common Vulnerability Exposure (CVE) ID: CVE-2007-3294
https://www.exploit-db.com/exploits/4080
http://osvdb.org/36853
http://secunia.com/advisories/25735
XForce ISS Database: php-tidy-parsestring-bo(34931)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34931
Common Vulnerability Exposure (CVE) ID: CVE-2007-3378
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 24661
http://www.securityfocus.com/bid/24661
BugTraq ID: 25498
http://www.securityfocus.com/bid/25498
Bugtraq: 20070627 PHP 4/5 htaccess safemode and open_basedir Bypass (Google Search)
http://www.securityfocus.com/archive/1/472343/100/0/threaded
http://seclists.org/fulldisclosure/2020/Sep/34
HPdes Security Advisory: HPSBUX02308
HPdes Security Advisory: HPSBUX02332
HPdes Security Advisory: SSRT080010
HPdes Security Advisory: SSRT080056
http://securityreason.com/achievement_exploitalert/9
http://www.openwall.com/lists/oss-security/2020/09/17/3
http://www.osvdb.org/38682
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/27648
http://secunia.com/advisories/29420
http://securityreason.com/securityalert/2831
http://securityreason.com/securityalert/3389
http://securityreason.com/achievement_securityalert/45
http://www.trustix.org/errata/2007/0026/
http://www.vupen.com/english/advisories/2007/3023
http://www.vupen.com/english/advisories/2008/0924/references
XForce ISS Database: php-htaccess-security-bypass(35102)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
XForce ISS Database: php-sessionsavepath-errorlog-security-bypass(39403)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
Common Vulnerability Exposure (CVE) ID: CVE-2007-3790
https://www.exploit-db.com/exploits/4175
http://osvdb.org/36854
Common Vulnerability Exposure (CVE) ID: CVE-2007-3799
BugTraq ID: 24268
http://www.securityfocus.com/bid/24268
Debian Security Information: DSA-1444 (Google Search)
http://www.debian.org/security/2008/dsa-1444
Debian Security Information: DSA-1578 (Google Search)
http://www.debian.org/security/2008/dsa-1578
http://www.php-security.org/MOPB/PMOPB-46-2007.html
http://osvdb.org/36855
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9792
RedHat Security Advisories: RHSA-2007:0889
http://secunia.com/advisories/28249
http://secunia.com/advisories/30288
SuSE Security Announcement: SUSE-SR:2007:015 (Google Search)
http://www.novell.com/linux/security/advisories/2007_15_sr.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-3806
BugTraq ID: 24922
http://www.securityfocus.com/bid/24922
Debian Security Information: DSA-1572 (Google Search)
http://www.debian.org/security/2008/dsa-1572
http://www.exploit-db.com/exploits/4181
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
http://osvdb.org/36085
http://secunia.com/advisories/26085
http://secunia.com/advisories/30158
http://www.vupen.com/english/advisories/2007/2547
XForce ISS Database: php-glob-security-bypass(35437)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
Common Vulnerability Exposure (CVE) ID: CVE-2007-4010
BugTraq ID: 25041
http://www.securityfocus.com/bid/25041
https://www.exploit-db.com/exploits/4218
XForce ISS Database: win32std-winshellexecute-security-bypass(35604)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35604
Common Vulnerability Exposure (CVE) ID: CVE-2007-4033
BugTraq ID: 25079
http://www.securityfocus.com/bid/25079
Bugtraq: 20070921 Re: [Full-disclosure] [USN-515-1] t1lib vulnerability (Google Search)
http://www.securityfocus.com/archive/1/480239/100/100/threaded
Bugtraq: 20070921 Re: [USN-515-1] t1lib vulnerability (Google Search)
http://www.securityfocus.com/archive/1/480244/100/100/threaded
Bugtraq: 20080105 rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi (Google Search)
http://www.securityfocus.com/archive/1/485823/100/0/threaded
Bugtraq: 20080212 FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts (Google Search)
http://www.securityfocus.com/archive/1/487984/100/0/threaded
Debian Security Information: DSA-1390 (Google Search)
http://www.debian.org/security/2007/dsa-1390
https://www.exploit-db.com/exploits/4227
http://fedoranews.org/updates/FEDORA-2007-234.shtml
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html
http://security.gentoo.org/glsa/glsa-200710-12.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:189
http://www.mandriva.com/security/advisories?name=MDKSA-2007:230
http://www.bugtraq.ir/adv/t1lib.txt
https://bugzilla.redhat.com/show_bug.cgi?id=303021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10557
http://www.redhat.com/support/errata/RHSA-2007-1027.html
http://www.redhat.com/support/errata/RHSA-2007-1030.html
http://www.redhat.com/support/errata/RHSA-2007-1031.html
http://www.securitytracker.com/id?1018905
http://secunia.com/advisories/26241
http://secunia.com/advisories/26901
http://secunia.com/advisories/26981
http://secunia.com/advisories/26992
http://secunia.com/advisories/27239
http://secunia.com/advisories/27297
http://secunia.com/advisories/27439
http://secunia.com/advisories/27599
http://secunia.com/advisories/27718
http://secunia.com/advisories/27743
http://secunia.com/advisories/28345
http://secunia.com/advisories/30168
SuSE Security Announcement: SUSE-SR:2007:023 (Google Search)
http://www.novell.com/linux/security/advisories/2007_23_sr.html
http://www.ubuntu.com/usn/usn-515-1
XForce ISS Database: php-imagepsloadfont-bo(35620)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35620
Common Vulnerability Exposure (CVE) ID: CVE-2007-4255
BugTraq ID: 25213
http://www.securityfocus.com/bid/25213
Bugtraq: 20070805 PHP mSQL (msql_connect) Buffer Overflow PoC (Google Search)
http://www.securityfocus.com/archive/1/475660/100/0/threaded
https://www.exploit-db.com/exploits/4260
XForce ISS Database: php-msql-connect-bo(35830)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35830
Common Vulnerability Exposure (CVE) ID: CVE-2007-4507
https://www.exploit-db.com/exploits/4304
Common Vulnerability Exposure (CVE) ID: CVE-2007-4652
XForce ISS Database: php-session-security-bypass(36387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36387
Common Vulnerability Exposure (CVE) ID: CVE-2007-4658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10363
SuSE Security Announcement: SUSE-SA:2008:004 (Google Search)
XForce ISS Database: php-moneyformat-unspecified(36377)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36377
Common Vulnerability Exposure (CVE) ID: CVE-2007-4659
XForce ISS Database: php-zendalterinientry-unspecified(36380)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36380
Common Vulnerability Exposure (CVE) ID: CVE-2007-4660
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
Common Vulnerability Exposure (CVE) ID: CVE-2007-4661
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.58&r2=1.445.2.14.2.59
Common Vulnerability Exposure (CVE) ID: CVE-2007-4662
XForce ISS Database: php-phpopensslmakereq-bo(36390)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36390
Common Vulnerability Exposure (CVE) ID: CVE-2007-4663
XForce ISS Database: php-glob-security-bypass(36386)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36386
CopyrightCopyright (C) 2012 NopSec Inc.

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.