139.144.55.226

Regular View Raw Data

GeneralInformation

Hostnames 139-144-55-226.ip.linodeusercontent.com
Domains linodeusercontent.com 
Cloud Provider Linode
Cloud Region us-ga
Country United States
City Atlanta
Organization Linode
ISP Akamai Connected Cloud
ASN AS63949

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

OpenPorts

11131517192122232425263743495370798081828384878889909197102104106110111113119122135137139143175179195211221222263264311389427443444445450465502515548554587593631636666771789801805806873902943992993995999102310241027102910801099115311671177122412341290131113371344140014141433144214711521159916041723174118001801182018801883191119251926193519621981200020022003200820122021205520592062206720792081208220832086208721112121212621542181221122202222224522502320232323322345237523762379240424432480250625482549256025622601262827092761276230003001300530503055306030633069307130753076308030833086309931043105311531183128320032603268326932993301330633103333333733883389340234093410346035033541354235513560356135633566356835693689373137493780379039513952395440004002402240404042406340644118419042424282432143694433443444434444448245004506454545504567464346644700478247864808484048484899491149494999500050015005500650075009501050255060509051505172520152225269532153535357540054325435544354945555556055675590559455975601560356075608563456975800580158535858590059015907593859845985598660006001600260076008608061616262626563796443651265436580663366506653666466666667666866977000700170027071708171717218731674157434744374747493754775487557763476547657777677777779778878877989799880008001800280048007800880098010802880318033803980438046804880528060806480698080808180828083808480858086808780888089809080968098809981018107810981128123812681398140818081818188820082228237824982518282829183338334838384068415841984258426844284438445844784488500853785458554857585858602862186498688872887668779878887898800880388108812881388198820882188318834884388448855885988608868886988738874887688788880888888898988899190009001900290049005900690099012901390149016901990219022902790299030903190369040904290499051908090909091909590979100910991369151916091919199920092029215921992519295930193029304930593069367939894189433944394459530959596009637969097049735976198009861986998769898994399449981998899949998999910000100011007310134101431024310250104431055410909109111100011112112101121111300113711143412000122351357914147142651434415301154431601016030162851667016992169931700018081182451844318553190001907119930200002025620547208802102521027213792200022067220692207022222230232342425001251052556526656266572701527017280002801528017300023000330301303033133731401314433240032764330603344535000372153777738333392774144341800421134239843118441584481847990491524915350000500505007050100507195110651235514135144352311528695413854321543615500055442554435555355554600016001060030605676161361616620786220063210
2043674300 | 2024-09-13T13:49:24.360923
  
11 / tcp
-314479772 | 2024-09-13T13:22:10.025102
  
13 / tcp
1634975959 | 2024-09-13T10:33:11.264159
  
15 / tcp
-1082131982 | 2024-09-13T11:17:28.125365
  
19 / tcp
-670018157 | 2024-09-13T05:55:59.344731
  
21 / tcp
67598976 | 2024-09-13T10:27:57.408566
  
22 / tcp
-544561682 | 2024-09-13T07:42:25.604778
  
23 / tcp
-1249055096 | 2024-08-24T13:27:56.417401
  
24 / tcp
231218081 | 2024-09-13T02:59:27.942607
  
25 / tcp
241987371 | 2024-09-13T07:43:49.237886
  
26 / tcp
911762068 | 2024-09-13T13:23:36.223513
  
37 / tcp
36198710 | 2024-09-13T10:47:10.323458
  
43 / tcp
945797468 | 2024-09-13T09:46:28.578846
  
49 / tcp
866944877 | 2024-09-13T09:00:40.134013
  
53 / tcp
1450275882 | 2024-09-13T13:46:08.828790
  
53 / udp
259745872 | 2024-09-13T08:38:54.809746
  
70 / tcp
259745872 | 2024-09-13T10:21:20.332371
  
79 / tcp
-827967357 | 2024-09-13T13:01:38.287358
  
80 / tcp
-1603997010 | 2024-09-13T07:20:55.211972
  
81 / tcp
-68374320 | 2024-09-13T08:23:37.948355
  
82 / tcp
-91257763 | 2024-09-13T11:55:58.136844
  
83 / tcp
286230706 | 2024-09-13T05:06:38.355792
  
84 / tcp
528267732 | 2024-09-04T04:32:14.137154
  
87 / tcp
984566029 | 2024-09-13T14:04:30.734475
  
88 / tcp
-1686225081 | 2024-09-12T15:24:20.496291
  
89 / tcp
528267732 | 2024-08-24T11:47:04.247437
  
90 / tcp
-1372475036 | 2024-08-29T15:41:10.516032
  
91 / tcp
1230110844 | 2024-08-27T13:06:49.564851
  
97 / tcp
-206328005 | 2024-09-13T12:10:24.566438
  
102 / tcp
-1729643016 | 2024-09-13T02:07:49.770859
  
104 / tcp
198503670 | 2024-08-20T11:33:55.628771
  
106 / tcp
1418859682 | 2024-09-13T10:39:14.585648
  
110 / tcp
2117710047 | 2024-09-13T07:14:02.753803
  
111 / tcp
1771607083 | 2024-09-13T09:45:02.519244
  
113 / tcp
-365413524 | 2024-09-13T07:09:04.215613
  
119 / tcp
-1563694325 | 2024-09-12T10:37:59.240030
  
122 / tcp
477215837 | 2024-09-13T07:49:05.117280
  
135 / tcp
370444245 | 2024-09-13T11:06:16.237436
  
137 / udp
-243946496 | 2024-08-26T08:43:42.981014
  
139 / tcp
-2032693845 | 2024-09-13T13:07:58.040624
  
143 / tcp
-571909786 | 2024-09-13T05:18:23.286261
  
175 / tcp
-430621287 | 2024-09-13T12:59:34.775107
  
179 / tcp
667672571 | 2024-09-13T00:35:39.769159
  
195 / tcp
-1128811888 | 2024-09-04T06:20:16.972122
  
211 / tcp
680985346 | 2024-09-13T07:03:39.634795
  
221 / tcp
758400235 | 2024-08-29T09:02:30.413230
  
222 / tcp
1598694629 | 2024-08-30T04:32:07.293577
  
263 / tcp
-148145005 | 2024-09-13T06:53:44.115172
  
264 / tcp
-1055776097 | 2024-09-13T13:49:55.110276
  
311 / tcp
-1528008955 | 2024-09-13T11:50:05.933499
  
389 / tcp
-841822186 | 2024-09-13T12:23:58.922914
  
427 / tcp
1227616475 | 2024-09-13T09:31:53.875355
  
443 / tcp
1091720755 | 2024-09-13T10:05:02.909158
  
444 / tcp
749160247 | 2024-09-13T10:27:50.506230
  
445 / tcp
2102160684 | 2024-09-02T19:57:32.306892
  
450 / tcp
157903443 | 2024-09-13T09:58:37.263443
  
465 / tcp
1189404375 | 2024-09-13T05:38:46.783051
  
502 / tcp
1717448415 | 2024-09-13T10:05:16.344838
  
515 / tcp
-1579293701 | 2024-09-12T22:56:45.723033
  
548 / tcp
1319633889 | 2024-09-13T06:46:52.466589
  
554 / tcp
943972735 | 2024-09-08T19:13:33.128652
  
587 / tcp
239507164 | 2024-09-13T12:19:28.606278
  
593 / tcp
-701599189 | 2024-09-13T12:15:48.902622
  
631 / tcp
-2046121314 | 2024-09-13T10:41:15.672433
  
636 / tcp
-805702575 | 2024-09-13T09:13:05.553195
  
666 / tcp
891914399 | 2024-09-13T06:47:23.716918
  
771 / tcp
-2133879931 | 2024-09-13T06:23:47.587110
  
789 / tcp
-842461743 | 2024-08-30T02:49:58.150345
  
801 / tcp
438882632 | 2024-08-15T21:14:14.461989
  
805 / tcp
-1562269364 | 2024-09-02T10:10:10.621272
  
806 / tcp
631104875 | 2024-09-13T13:39:17.746467
  
873 / tcp
1645320382 | 2024-09-13T06:27:55.271532
  
902 / tcp
2045561095 | 2024-08-25T02:54:08.924108
  
943 / tcp
-1577511066 | 2024-09-10T21:46:30.143344
  
992 / tcp
-1055776097 | 2024-09-13T07:51:34.994916
  
993 / tcp
-1853856506 | 2024-09-13T09:50:14.072772
  
995 / tcp
-793786779 | 2024-09-13T12:55:06.600876
  
999 / tcp
-573471194 | 2024-09-13T00:34:20.261848
  
1023 / tcp
-280008540 | 2024-09-13T11:50:33.741177
  
1024 / tcp
1320805067 | 2024-08-20T09:27:26.106254
  
1027 / tcp
918620788 | 2024-08-23T17:50:28.644734
  
1029 / tcp
-201712939 | 2024-08-24T07:16:40.054300
  
1080 / tcp
1627801606 | 2024-09-13T05:52:22.174746
  
1099 / tcp
1273970973 | 2024-09-13T13:49:03.228170
  
1153 / tcp
1910458146 | 2024-09-10T18:29:48.022464
  
1167 / tcp
-717235822 | 2024-09-09T11:21:16.730979
  
1177 / tcp
1413876536 | 2024-08-30T22:21:58.720699
  
1224 / tcp
1019593241 | 2024-09-13T08:33:26.080932
  
1234 / tcp
1807415740 | 2024-09-13T10:41:09.841616
  
1290 / tcp
-2107778318 | 2024-09-13T07:56:49.734272
  
1311 / tcp
-1499748213 | 2024-09-12T21:56:28.355160
  
1337 / tcp
-201712939 | 2024-08-21T12:04:57.470381
  
1344 / tcp
1864524269 | 2024-09-13T09:17:02.313216
  
1400 / tcp
1182468433 | 2024-09-10T03:25:14.810396
  
1414 / tcp
1682414711 | 2024-09-13T04:26:00.124692
  
1433 / tcp
-256818119 | 2024-09-04T01:01:10.468190
  
1442 / tcp
1864524269 | 2024-09-13T07:22:47.625200
  
1471 / tcp
-741156574 | 2024-09-13T12:14:31.475170
  
1521 / tcp
1050704104 | 2024-09-12T23:47:48.356181
  
1599 / tcp
504577766 | 2024-09-13T13:49:15.064242
  
1604 / tcp
941448006 | 2024-09-13T12:28:27.937380
  
1723 / tcp
-1554172409 | 2024-09-13T11:19:26.086823
  
1741 / tcp
-1323302264 | 2024-09-13T00:09:12.835882
  
1800 / tcp
2024151594 | 2024-09-13T05:24:56.398630
  
1801 / tcp
439857921 | 2024-08-27T17:00:06.188979
  
1820 / tcp
1676200473 | 2024-08-22T18:35:44.091819
  
1880 / tcp
421466966 | 2024-09-12T08:38:18.285281
  
1883 / tcp
1105699109 | 2024-09-13T13:42:28.272791
  
1911 / tcp
1875311921 | 2024-09-13T04:59:34.151257
  
1925 / tcp
-1072458989 | 2024-09-13T10:12:52.598455
  
1926 / tcp
-2045834549 | 2024-09-13T10:17:18.849439
  
1935 / tcp
-644975174 | 2024-09-13T05:25:02.075400
  
1962 / tcp
495499868 | 2024-09-12T00:12:45.484049
  
1981 / tcp
1973863087 | 2024-09-13T07:04:50.466007
  
2000 / tcp
-1252295076 | 2024-09-13T09:21:57.597384
  
2002 / tcp
239507164 | 2024-08-19T05:45:06.596548
  
2003 / tcp
-1648763127 | 2024-09-09T16:52:33.825696
  
2008 / tcp
-2101259082 | 2024-08-18T02:46:28.842040
  
2012 / tcp
1189404375 | 2024-08-22T17:19:41.256087
  
2021 / tcp
-478108628 | 2024-09-05T12:30:43.537211
  
2055 / tcp
-314479772 | 2024-08-15T07:40:49.892660
  
2059 / tcp
1560952835 | 2024-08-27T09:27:41.828558
  
2062 / tcp
217153811 | 2024-09-13T05:33:05.803136
  
2067 / tcp
86135465 | 2024-08-17T03:16:07.270416
  
2079 / tcp
-1519623158 | 2024-09-13T06:59:25.236889
  
2081 / tcp
1582186300 | 2024-09-13T09:39:51.151165
  
2082 / tcp
-241000015 | 2024-09-13T11:39:54.630770
  
2083 / tcp
-1978093982 | 2024-09-13T05:18:15.764631
  
2086 / tcp
1093634893 | 2024-09-13T11:58:15.156491
  
2087 / tcp
-633208297 | 2024-08-25T16:53:45.885496
  
2111 / tcp
1731326561 | 2024-09-13T11:14:55.936103
  
2121 / tcp
1170437197 | 2024-08-25T21:55:31.805168
  
2126 / tcp
1998496741 | 2024-09-13T09:35:56.963341
  
2154 / tcp
-126184584 | 2024-09-13T10:01:32.796682
  
2181 / tcp
1157735528 | 2024-09-08T01:00:06.643582
  
2211 / tcp
-1862716756 | 2024-08-17T16:42:33.711644
  
2220 / tcp
-870811186 | 2024-09-13T14:00:35.996822
  
2222 / tcp
1682582766 | 2024-08-30T20:55:13.941535
  
2245 / tcp
1757329355 | 2024-08-22T06:27:12.753751
  
2250 / tcp
1634975959 | 2024-09-09T06:17:36.730505
  
2320 / tcp
587802316 | 2024-09-13T08:19:02.879299
  
2323 / tcp
-1183579205 | 2024-09-13T04:47:04.482081
  
2332 / tcp
-1729643016 | 2024-09-13T04:25:20.614594
  
2345 / tcp
185239291 | 2024-09-13T13:52:24.099981
  
2375 / tcp
-1978093982 | 2024-09-13T12:04:28.306770
  
2376 / tcp
86108239 | 2024-09-04T20:18:15.723966
  
2379 / tcp
-390179353 | 2024-09-11T21:50:29.835467
  
2443 / tcp
1668587164 | 2024-09-13T07:16:27.228789
  
2480 / tcp
-1288692688 | 2024-09-13T06:47:15.342609
  
2506 / tcp
-2033507842 | 2024-08-24T11:51:46.291519
  
2548 / tcp
1414619 | 2024-09-11T18:35:58.580671
  
2549 / tcp
-2101259082 | 2024-09-13T04:29:07.589541
  
2560 / tcp
-1708468768 | 2024-08-21T10:18:39.635730
  
2562 / tcp
-2121646895 | 2024-09-09T16:09:34.377940
  
2601 / tcp
-1385501843 | 2024-09-13T02:02:49.793990
  
2628 / tcp
-743661865 | 2024-08-26T20:34:37.770686
  
2709 / tcp
-1729643016 | 2024-09-13T12:33:39.654286
  
2761 / tcp
-1729643016 | 2024-09-13T06:26:20.151982
  
2762 / tcp
1206155013 | 2024-09-13T14:11:27.055131
  
3000 / tcp
1359213659 | 2024-09-12T19:29:56.270716
  
3001 / tcp
-983634052 | 2024-08-28T13:10:59.253886
  
3005 / tcp
1730208901 | 2024-09-13T13:37:14.405673
  
3050 / tcp
-409105471 | 2024-09-03T12:12:42.331121
  
3055 / tcp
1562325040 | 2024-08-26T01:34:32.458789
  
3060 / tcp
-1881552390 | 2024-09-04T06:37:41.201299
  
3063 / tcp
198503670 | 2024-09-01T08:50:49.723612
  
3069 / tcp
1030370277 | 2024-09-08T01:13:17.893381
  
3071 / tcp
495499868 | 2024-08-18T16:53:28.435709
  
3075 / tcp
2043674300 | 2024-08-25T16:12:06.025835
  
3076 / tcp
225736293 | 2024-09-02T07:12:55.813461
  
3080 / tcp
-1804257811 | 2024-08-17T19:30:06.614481
  
3083 / tcp
478273823 | 2024-08-27T14:45:04.854911
  
3086 / tcp
641579775 | 2024-08-21T15:20:11.479937
  
3099 / tcp
-1853856506 | 2024-09-08T11:42:06.142041
  
3104 / tcp
-1563694325 | 2024-08-21T11:46:35.160037
  
3105 / tcp
1040126544 | 2024-09-03T14:37:34.717624
  
3115 / tcp
225736293 | 2024-09-12T14:55:42.172439
  
3118 / tcp
-673860120 | 2024-09-13T05:57:22.242341
  
3128 / tcp
-1997288571 | 2024-09-04T20:33:44.820324
  
3200 / tcp
-829322809 | 2024-09-13T13:43:21.736281
  
3260 / tcp
-1528008955 | 2024-09-13T04:50:21.121572
  
3268 / tcp
2060753471 | 2024-09-13T13:46:26.995024
  
3269 / tcp
-163589323 | 2024-09-13T10:37:26.994701
  
3299 / tcp
-368913292 | 2024-09-13T04:00:19.182075
  
3301 / tcp
-1586063280 | 2024-09-13T13:17:02.240768
  
3306 / tcp
1009173221 | 2024-09-13T09:58:11.534706
  
3310 / tcp
-1648763127 | 2024-09-13T08:08:12.645145
  
3333 / tcp
-1840324437 | 2024-08-18T17:02:12.881668
  
3337 / tcp
-813679359 | 2024-09-13T11:38:58.526446
  
3388 / tcp
940603052 | 2024-09-12T12:34:51.282116
  
3389 / tcp
-331237787 | 2024-09-05T23:47:43.388339
  
3402 / tcp
396286580 | 2024-09-11T02:21:18.054757
  
3409 / tcp
1656222486 | 2024-09-12T13:12:46.095246
  
3410 / tcp
-691462922 | 2024-09-11T11:19:03.825171
  
3460 / tcp
1750032197 | 2024-09-11T18:31:37.558632
  
3503 / tcp
-763272357 | 2024-09-13T09:28:53.556125
  
3541 / tcp
-280008540 | 2024-09-13T14:05:58.404436
  
3542 / tcp
-1338510687 | 2024-09-13T11:14:55.629587
  
3551 / tcp
-574509004 | 2024-08-26T22:21:01.081004
  
3560 / tcp
1764038751 | 2024-08-26T10:38:51.118864
  
3561 / tcp
1864524269 | 2024-08-18T13:33:54.172063
  
3563 / tcp
-868897275 | 2024-09-13T10:02:35.312009
  
3566 / tcp
883351539 | 2024-08-18T07:29:28.819659
  
3568 / tcp
-280008540 | 2024-08-31T23:40:14.491610
  
3569 / tcp
423902863 | 2024-09-12T20:40:41.088069
  
3689 / tcp
-400786725 | 2024-08-15T18:48:11.484280
  
3731 / tcp
421466966 | 2024-09-13T05:34:27.084373
  
3749 / tcp
2079499411 | 2024-09-13T03:26:33.073591
  
3780 / tcp
2138855327 | 2024-09-13T13:43:55.968004
  
3790 / tcp
-1242934909 | 2024-09-10T05:33:22.555983
  
3951 / tcp
1565228449 | 2024-09-10T10:02:23.672646
  
3952 / tcp
-409105471 | 2024-08-16T18:49:36.205511
  
3954 / tcp
-2140753145 | 2024-09-13T10:36:48.579514
  
4000 / tcp
326045839 | 2024-08-18T00:29:43.858237
  
4002 / tcp
229429842 | 2024-09-13T13:45:17.477452
  
4022 / tcp
-382674434 | 2024-09-13T02:08:06.353819
  
4040 / tcp
-660412669 | 2024-09-04T05:23:16.932755
  
4042 / tcp
2043674300 | 2024-09-13T06:25:49.352847
  
4063 / tcp
0 | 2024-09-13T12:08:48.701274
  
4064 / tcp
-67371425 | 2024-08-23T13:54:35.263152
  
4118 / tcp
-1474353698 | 2024-09-11T04:27:33.313795
  
4190 / tcp
-1729643016 | 2024-09-13T07:37:48.774634
  
4242 / tcp
857654001 | 2024-09-09T09:54:02.468935
  
4282 / tcp
2052086735 | 2024-09-13T13:57:51.562779
  
4321 / tcp
600091538 | 2024-09-13T04:15:07.728591
  
4369 / tcp
-701599189 | 2024-09-13T12:29:57.098005
  
4433 / tcp
-544222884 | 2024-09-10T14:54:22.983731
  
4434 / tcp
1803390765 | 2024-09-13T08:50:23.356893
  
4443 / tcp
1938503129 | 2024-09-13T06:17:54.285496
  
4444 / tcp
-1006986421 | 2024-09-05T20:45:12.679836
  
4482 / tcp
413265474 | 2024-09-13T05:17:25.852255
  
4500 / tcp
-1730740511 | 2024-09-12T23:08:18.567316
  
4506 / tcp
1701131987 | 2024-08-26T23:40:21.183209
  
4545 / tcp
-2094239055 | 2024-09-02T16:19:23.237250
  
4550 / tcp
-1076787754 | 2024-09-13T11:22:45.869805
  
4567 / tcp
126662165 | 2024-09-10T22:59:22.191289
  
4643 / tcp
-534571453 | 2024-09-13T08:36:18.201252
  
4664 / tcp
-1314092983 | 2024-08-16T04:03:44.651251
  
4700 / tcp
1407972033 | 2024-09-13T09:59:25.467783
  
4782 / tcp
919919958 | 2024-09-13T12:09:33.495604
  
4786 / tcp
-704595586 | 2024-08-27T06:10:11.037269
  
4808 / tcp
-1233412893 | 2024-09-13T03:53:32.004792
  
4840 / tcp
-1402329079 | 2024-09-13T02:14:13.696309
  
4848 / tcp
-837125967 | 2024-09-13T06:32:30.071901
  
4899 / tcp
-1614747336 | 2024-09-13T06:04:03.471978
  
4911 / tcp
438040612 | 2024-09-13T12:56:58.519713
  
4949 / tcp
-1951894060 | 2024-09-12T11:02:47.909410
  
4999 / tcp
-46119267 | 2024-09-13T09:16:12.721760
  
5000 / tcp
445674546 | 2024-09-13T11:11:37.547601
  
5001 / tcp
-497733652 | 2024-09-13T08:20:36.974458
  
5005 / tcp
185239291 | 2024-09-13T13:42:02.383056
  
5006 / tcp
-1676661285 | 2024-09-13T10:25:59.563114
  
5007 / tcp
1345772178 | 2024-09-13T12:37:16.764160
  
5009 / tcp
-1623616499 | 2024-09-13T06:15:26.609980
  
5010 / tcp
1772703101 | 2024-09-13T07:26:48.111238
  
5025 / tcp
-1119615063 | 2024-09-13T12:16:03.240780
  
5060 / udp
-604012175 | 2024-08-23T20:47:00.037396
  
5090 / tcp
-1249055096 | 2024-09-04T09:38:51.044402
  
5150 / tcp
1869668354 | 2024-09-11T21:37:24.154004
  
5172 / tcp
-1865725876 | 2024-09-13T11:58:06.808990
  
5201 / tcp
887663638 | 2024-09-13T08:47:19.969662
  
5222 / tcp
887663638 | 2024-09-13T11:19:55.016063
  
5269 / tcp
581096625 | 2024-09-12T02:48:58.092036
  
5321 / tcp
-746400151 | 2024-09-13T13:58:08.902934
  
5353 / udp
-2107778318 | 2024-09-13T09:57:17.638859
  
5357 / tcp
-743661865 | 2024-09-12T11:37:44.604057
  
5400 / tcp
-726790289 | 2024-09-13T13:03:29.965977
  
5432 / tcp
-701599189 | 2024-09-07T03:58:14.139941
  
5443 / tcp
-1592806120 | 2024-08-27T00:01:29.549015
  
5494 / tcp
-1853856506 | 2024-09-13T10:35:15.296734
  
5555 / tcp
-1006986421 | 2024-09-13T13:42:21.334335
  
5560 / tcp
-14733041 | 2024-09-10T00:46:22.943693
  
5567 / tcp
-1314092983 | 2024-08-15T05:52:44.267121
  
5590 / tcp
448266770 | 2024-09-03T20:52:37.234998
  
5594 / tcp
-1024342659 | 2024-09-07T20:10:30.486354
  
5597 / tcp
-182117361 | 2024-09-13T13:12:58.866977
  
5601 / tcp
-990199279 | 2024-08-18T17:09:00.482385
  
5603 / tcp
1228721859 | 2024-08-17T23:44:09.797399
  
5607 / tcp
964603593 | 2024-09-02T07:19:54.540112
  
5608 / tcp
2045561095 | 2024-08-29T00:48:52.160114
  
5634 / tcp
-2001897995 | 2024-08-29T22:10:51.918455
  
5697 / tcp
-2101259082 | 2024-09-13T04:04:20.382010
  
5800 / tcp
1726901857 | 2024-09-13T06:18:28.418066
  
5801 / tcp
-582398285 | 2024-09-09T11:30:33.425988
  
5853 / tcp
1158546688 | 2024-09-13T13:09:36.150716
  
5858 / tcp
-956025775 | 2024-09-13T13:54:09.088970
  
5900 / tcp
2146134864 | 2024-09-13T12:51:47.280506
  
5901 / tcp
984566029 | 2024-09-04T16:32:53.447795
  
5907 / tcp
-1333942476 | 2024-09-13T08:37:34.058667
  
5938 / tcp
849537682 | 2024-09-13T08:37:31.068652
  
5984 / tcp
1359213659 | 2024-09-13T06:10:41.536935
  
5985 / tcp
-254353173 | 2024-09-13T04:53:42.267468
  
5986 / tcp
795831555 | 2024-09-13T08:29:36.908476
  
6000 / tcp
795831555 | 2024-09-13T13:49:03.400026
  
6001 / tcp
96240699 | 2024-09-13T07:07:52.446056
  
6002 / tcp
-331237787 | 2024-09-03T21:17:36.684228
  
6007 / tcp
-1614747336 | 2024-09-04T15:01:52.230837
  
6008 / tcp
-2101259082 | 2024-09-13T04:10:00.023220
  
6080 / tcp
1757329355 | 2024-08-20T21:19:33.745813
  
6161 / tcp
716214331 | 2024-08-29T19:52:06.200721
  
6262 / tcp
1509946435 | 2024-08-22T14:17:01.614486
  
6265 / tcp
-699320078 | 2024-09-13T08:46:11.743614
  
6379 / tcp
1205660911 | 2024-09-13T07:25:37.950141
  
6443 / tcp
-721114820 | 2024-08-20T12:50:38.792873
  
6512 / tcp
239507164 | 2024-09-09T07:49:19.320988
  
6543 / tcp
-787944682 | 2024-08-16T08:57:55.845320
  
6580 / tcp
-1683387969 | 2024-09-13T09:00:10.096118
  
6633 / tcp
993325534 | 2024-09-12T09:41:54.051837
  
6650 / tcp
-1683387969 | 2024-09-13T10:39:19.043336
  
6653 / tcp
1645320382 | 2024-09-13T11:10:33.895686
  
6664 / tcp
471426902 | 2024-09-13T08:15:42.212104
  
6666 / tcp
-1750020866 | 2024-09-13T06:12:15.708211
  
6667 / tcp
-1498789254 | 2024-09-13T07:32:58.916119
  
6668 / tcp
0 | 2024-09-13T06:34:20.093815
  
6697 / tcp
993325534 | 2024-08-28T09:07:54.843773
  
7000 / tcp
1189404375 | 2024-09-13T08:11:49.054172
  
7001 / tcp
1958153000 | 2024-08-30T04:18:56.121803
  
7002 / tcp
-1155257125 | 2024-09-13T02:18:39.622692
  
7071 / tcp
-986510667 | 2024-08-15T13:21:08.027705
  
7081 / tcp
784773903 | 2024-09-13T08:16:58.852943
  
7171 / tcp
-201712939 | 2024-09-13T09:45:44.079817
  
7218 / tcp
-1183573335 | 2024-08-27T19:48:02.836371
  
7316 / tcp
160807145 | 2024-09-05T14:00:33.952435
  
7415 / tcp
-145754652 | 2024-08-29T16:42:14.767425
  
7434 / tcp
1897987246 | 2024-09-13T08:38:41.364749
  
7443 / tcp
-483874377 | 2024-09-13T13:00:24.899884
  
7474 / tcp
-1603997010 | 2024-08-28T21:21:40.239778
  
7493 / tcp
-1351279420 | 2024-09-13T13:58:40.606251
  
7547 / tcp
-1965327529 | 2024-09-13T09:13:31.325191
  
7548 / tcp
-1410736956 | 2024-08-30T18:21:16.496472
  
7557 / tcp
970033449 | 2024-09-13T07:22:38.186585
  
7634 / tcp
-1407503894 | 2024-09-08T19:14:56.176608
  
7654 / tcp
-638400093 | 2024-09-13T13:34:37.016600
  
7657 / tcp
286230706 | 2024-08-25T09:56:56.302125
  
7776 / tcp
-673860120 | 2024-09-13T05:43:11.760805
  
7777 / tcp
-1951894060 | 2024-09-13T11:52:03.183736
  
7779 / tcp
432779316 | 2024-09-07T07:54:18.783418
  
7788 / tcp
-524839487 | 2024-08-30T13:21:27.033848
  
7887 / tcp
-742903296 | 2024-09-13T13:06:33.710977
  
7989 / tcp
1612532060 | 2024-09-08T12:04:52.771623
  
7998 / tcp
-1610884520 | 2024-09-13T12:15:49.174268
  
8000 / tcp
-1840324437 | 2024-09-13T05:51:33.510559
  
8001 / tcp
-98684020 | 2024-09-08T19:15:56.147477
  
8002 / tcp
902245993 | 2024-09-08T18:54:19.369676
  
8004 / tcp
-985069039 | 2024-09-05T19:32:03.959413
  
8007 / tcp
464518933 | 2024-09-13T08:09:02.849073
  
8008 / tcp
-1805416872 | 2024-09-13T09:20:48.233636
  
8009 / tcp
-1189743078 | 2024-09-13T07:42:48.732089
  
8010 / tcp
1158064375 | 2024-08-19T05:15:12.758414
  
8028 / tcp
1757937021 | 2024-09-04T17:02:45.308263
  
8031 / tcp
899337393 | 2024-08-15T06:07:12.983767
  
8033 / tcp
-1220559682 | 2024-09-06T20:11:02.047661
  
8039 / tcp
-702344712 | 2024-08-25T13:33:01.936006
  
8043 / tcp
1204766608 | 2024-09-04T16:16:39.585304
  
8046 / tcp
375503917 | 2024-08-17T10:37:58.971060
  
8048 / tcp
-1006986421 | 2024-09-01T15:51:32.383591
  
8052 / tcp
-1562269364 | 2024-09-13T08:57:06.018860
  
8060 / tcp
1682301596 | 2024-08-25T15:58:27.650572
  
8064 / tcp
2052086735 | 2024-09-13T04:19:20.427452
  
8069 / tcp
878789156 | 2024-09-13T12:12:50.029268
  
8080 / tcp
-1562269364 | 2024-09-13T11:21:26.842214
  
8081 / tcp
614167191 | 2024-09-12T16:43:46.952582
  
8082 / tcp
-794985593 | 2024-09-13T13:29:03.827437
  
8083 / tcp
-1220559682 | 2024-08-25T02:37:27.477615
  
8084 / tcp
631104875 | 2024-09-12T23:00:16.915990
  
8085 / tcp
-1412348767 | 2024-09-13T05:41:26.808007
  
8086 / tcp
-1960720880 | 2024-09-13T04:53:31.739713
  
8087 / tcp
1158064375 | 2024-09-04T19:15:42.857226
  
8088 / tcp
-1635421054 | 2024-09-12T21:14:24.906940
  
8089 / tcp
1656222486 | 2024-09-13T11:44:58.602528
  
8090 / tcp
806897249 | 2024-08-19T15:57:53.167358
  
8096 / tcp
1413876536 | 2024-09-13T12:35:12.798919
  
8098 / tcp
-1845062215 | 2024-09-13T10:03:28.428999
  
8099 / tcp
-666145773 | 2024-08-31T22:00:14.756388
  
8101 / tcp
-2047182536 | 2024-08-18T20:34:37.210770
  
8107 / tcp
1413876536 | 2024-09-11T18:44:08.856556
  
8109 / tcp
375503917 | 2024-09-13T10:15:51.923343
  
8112 / tcp
-1635421054 | 2024-09-13T03:58:53.760514
  
8123 / tcp
1861147506 | 2024-09-13T05:22:06.208989
  
8126 / tcp
-2101259082 | 2024-09-13T05:54:54.013269
  
8139 / tcp
-1635529565 | 2024-09-13T10:17:18.858739
  
8140 / tcp
-1978093982 | 2024-08-30T00:09:48.585343
  
8180 / tcp
667545056 | 2024-09-13T08:37:45.431511
  
8181 / tcp
-2001897995 | 2024-08-27T14:36:16.668200
  
8188 / tcp
-1667250135 | 2024-09-13T14:00:59.804792
  
8200 / tcp
-1744991472 | 2024-09-04T05:40:02.957249
  
8222 / tcp
-1577511066 | 2024-09-12T19:08:52.530586
  
8237 / tcp
-1163057035 | 2024-09-06T20:51:56.607348
  
8249 / tcp
-748341846 | 2024-08-23T06:04:44.299640
  
8251 / tcp
-532600007 | 2024-08-30T22:52:15.355248
  
8282 / tcp
1783510313 | 2024-09-13T11:00:01.841741
  
8291 / tcp
930375752 | 2024-09-13T07:30:54.641407
  
8333 / tcp
495499868 | 2024-09-13T12:41:38.839197
  
8334 / tcp
493026148 | 2024-09-01T14:21:15.477655
  
8383 / tcp
1562712218 | 2024-09-06T02:40:29.172583
  
8406 / tcp
991837121 | 2024-08-26T12:13:24.687531
  
8415 / tcp
1414619 | 2024-08-15T20:39:01.178953
  
8419 / tcp
-338563053 | 2024-09-07T18:28:55.872095
  
8425 / tcp
1040126544 | 2024-09-07T17:07:02.629330
  
8426 / tcp
1682301596 | 2024-08-22T08:47:38.557076
  
8442 / tcp
-1022297893 | 2024-09-13T12:16:46.253853
  
8443 / tcp
1246489211 | 2024-08-17T15:24:47.135863
  
8445 / tcp
-389404245 | 2024-09-10T10:35:17.891897
  
8447 / tcp
-776839418 | 2024-09-07T20:05:30.665397
  
8448 / tcp
-1690705535 | 2024-09-11T20:11:51.865339
  
8500 / tcp
-1826025694 | 2024-08-19T18:03:17.714222
  
8537 / tcp
917988175 | 2024-09-13T11:02:50.781279
  
8545 / tcp
-386843761 | 2024-09-13T10:37:40.590778
  
8554 / tcp
917988175 | 2024-09-13T07:22:34.160378
  
8575 / tcp
130994943 | 2024-08-19T21:38:57.827078
  
8585 / tcp
-1513769382 | 2024-09-13T04:05:13.623599
  
8602 / tcp
86135465 | 2024-08-17T01:59:06.120717
  
8621 / tcp
1618361186 | 2024-09-13T07:40:44.350125
  
8649 / tcp
2052086735 | 2024-08-26T21:06:14.332491
  
8688 / tcp
2014726941 | 2024-09-13T09:34:23.837939
  
8728 / tcp
1897987246 | 2024-08-23T20:20:21.644622
  
8766 / tcp
-1087163215 | 2024-09-10T23:09:50.544374
  
8779 / tcp
911762068 | 2024-08-16T16:27:57.368509
  
8788 / tcp
1864524269 | 2024-08-20T17:17:12.117421
  
8789 / tcp
86135465 | 2024-09-13T11:50:39.441729
  
8800 / tcp
1342349133 | 2024-08-17T03:10:03.584374
  
8803 / tcp
-1249055096 | 2024-08-22T23:37:28.361507
  
8810 / tcp
-389404245 | 2024-08-22T22:41:54.339445
  
8812 / tcp
900132999 | 2024-09-07T12:05:49.857549
  
8813 / tcp
244769283 | 2024-08-22T01:15:11.166495
  
8819 / tcp
-1453129694 | 2024-08-24T03:47:29.125435
  
8820 / tcp
2014174392 | 2024-08-24T10:57:34.180133
  
8821 / tcp
1123532353 | 2024-08-30T08:28:18.018729
  
8831 / tcp
-900852103 | 2024-09-13T04:27:16.961160
  
8834 / tcp
-1220559682 | 2024-08-27T13:26:10.468272
  
8843 / tcp
-524839487 | 2024-09-03T11:24:48.659715
  
8844 / tcp
-1082842213 | 2024-09-06T12:26:59.931700
  
8855 / tcp
-1090827166 | 2024-09-12T21:50:06.975315
  
8859 / tcp
-8180875 | 2024-09-04T11:48:36.380137
  
8860 / tcp
-1143747485 | 2024-09-08T15:01:21.549383
  
8868 / tcp
1323783165 | 2024-08-15T06:24:55.107416
  
8869 / tcp
1562325040 | 2024-09-08T09:53:04.569854
  
8873 / tcp
-834180086 | 2024-09-13T04:24:04.352745
  
8874 / tcp
558429803 | 2024-09-13T08:58:51.598260
  
8876 / tcp
1998534294 | 2024-09-12T12:14:35.342040
  
8878 / tcp
899337393 | 2024-09-13T09:22:43.315518
  
8880 / tcp
1349900807 | 2024-09-13T14:05:14.167665
  
8888 / tcp
1864524269 | 2024-09-13T07:36:23.360993
  
8889 / tcp
-1805416872 | 2024-08-20T01:06:00.501484
  
8988 / tcp
-92041314 | 2024-08-19T01:20:30.946032
  
8991 / tcp
827069115 | 2024-09-13T11:51:16.871036
  
9000 / tcp
1930568551 | 2024-09-13T07:21:59.924772
  
9001 / tcp
-2101259082 | 2024-09-13T06:14:14.061325
  
9002 / tcp
2138855327 | 2024-09-07T14:42:06.494042
  
9004 / tcp
1676200473 | 2024-09-11T02:55:01.363706
  
9005 / tcp
-2101259082 | 2024-09-09T03:59:21.454491
  
9006 / tcp
-605759602 | 2024-09-13T11:24:15.095741
  
9009 / tcp
-338563053 | 2024-09-12T01:08:08.239825
  
9012 / tcp
1506764956 | 2024-08-15T16:18:28.740939
  
9013 / tcp
1194458621 | 2024-09-05T21:05:26.419222
  
9014 / tcp
-1242934909 | 2024-08-23T10:46:53.155120
  
9016 / tcp
-1953167471 | 2024-08-20T08:46:04.143633
  
9019 / tcp
1452084067 | 2024-08-21T15:53:57.648412
  
9021 / tcp
1228721859 | 2024-09-01T13:20:13.839708
  
9022 / tcp
1358573593 | 2024-08-19T07:24:32.502034
  
9027 / tcp
-972464208 | 2024-08-27T20:52:07.830083
  
9029 / tcp
-1909694290 | 2024-09-06T04:25:08.134374
  
9030 / tcp
432779316 | 2024-08-15T19:36:35.156220
  
9031 / tcp
-1591616640 | 2024-09-05T23:14:05.012353
  
9036 / tcp
-224996309 | 2024-09-11T06:26:16.672544
  
9040 / tcp
259745872 | 2024-09-13T11:15:21.253318
  
9042 / tcp
1340664484 | 2024-09-03T08:08:09.242136
  
9049 / tcp
-1428716113 | 2024-09-13T09:49:42.212355
  
9051 / tcp
-1845062215 | 2024-09-13T04:20:26.737513
  
9080 / tcp
215010355 | 2024-09-13T06:39:12.276412
  
9090 / tcp
-701599189 | 2024-09-13T10:28:04.412867
  
9091 / tcp
1399742211 | 2024-09-05T04:38:16.812545
  
9095 / tcp
-331237787 | 2024-08-28T08:15:06.413708
  
9097 / tcp
713892599 | 2024-09-13T12:51:42.597657
  
9100 / tcp
-972464208 | 2024-08-30T20:21:39.143785
  
9109 / tcp
-702344712 | 2024-08-30T12:47:32.732197
  
9136 / tcp
-1428716113 | 2024-09-13T13:41:46.082142
  
9151 / tcp
375503917 | 2024-09-13T08:56:55.968789
  
9160 / tcp
-1831383785 | 2024-09-13T12:26:09.609089
  
9191 / tcp
-8180875 | 2024-09-07T00:25:00.844218
  
9199 / tcp
642103544 | 2024-09-13T07:40:55.723366
  
9200 / tcp
2045561095 | 2024-08-28T23:01:10.309574
  
9202 / tcp
1542420912 | 2024-08-26T21:27:04.090779
  
9215 / tcp
1968880263 | 2024-08-16T06:40:15.636757
  
9219 / tcp
448266770 | 2024-08-18T05:28:12.079998
  
9251 / tcp
-1076787754 | 2024-09-13T13:14:10.799512
  
9295 / tcp
662736613 | 2024-08-21T11:47:28.607292
  
9301 / tcp
-1618953774 | 2024-08-28T20:38:02.945665
  
9302 / tcp
-738512607 | 2024-09-08T19:44:16.475808
  
9304 / tcp
-980178131 | 2024-09-01T02:53:29.434588
  
9305 / tcp
-165731831 | 2024-09-13T06:18:45.780034
  
9306 / tcp
576739529 | 2024-08-26T15:48:24.087613
  
9367 / tcp
33593150 | 2024-09-03T21:09:34.724384
  
9398 / tcp
1885911528 | 2024-09-13T07:11:04.756632
  
9418 / tcp
1025812070 | 2024-08-31T08:39:07.808164
  
9433 / tcp
996776072 | 2024-09-13T10:58:00.065133
  
9443 / tcp
1702863063 | 2024-09-01T03:33:54.752869
  
9445 / tcp
-1407972242 | 2024-09-13T12:05:33.683452
  
9530 / tcp
1562712218 | 2024-09-13T09:47:13.743344
  
9595 / tcp
-351127952 | 2024-09-13T08:14:12.726646
  
9600 / tcp
1189404375 | 2024-08-24T09:25:23.022329
  
9637 / tcp
-483874377 | 2024-08-26T03:59:50.822812
  
9690 / tcp
1403293853 | 2024-08-26T22:00:38.679859
  
9704 / tcp
-2101259082 | 2024-08-15T20:54:58.001547
  
9735 / tcp
-2024528579 | 2024-09-13T09:13:34.745116
  
9761 / tcp
1560952835 | 2024-09-13T08:22:03.405629
  
9800 / tcp
1656222486 | 2024-08-25T17:39:05.799583
  
9861 / tcp
1207342431 | 2024-09-13T03:54:33.644874
  
9869 / tcp
464518933 | 2024-09-13T01:41:03.543941
  
9876 / tcp
-813679359 | 2024-09-11T21:47:19.042951
  
9898 / tcp
-1562269364 | 2024-09-12T08:56:10.864898
  
9943 / tcp
1757329355 | 2024-09-13T00:59:41.606735
  
9944 / tcp
1323783165 | 2024-09-13T05:18:31.641648
  
9981 / tcp
-524839487 | 2024-08-22T10:19:58.777202
  
9988 / tcp
-1434812306 | 2024-09-11T07:15:59.355857
  
9994 / tcp
393153067 | 2024-09-13T13:17:59.840534
  
9998 / tcp
910647797 | 2024-09-13T13:06:11.258836
  
9999 / tcp
61486198 | 2024-09-13T08:27:33.885823
  
10000 / tcp
746042468 | 2024-09-13T06:02:51.516730
  
10001 / tcp
86135465 | 2024-08-28T22:36:25.074445
  
10073 / tcp
-2067028711 | 2024-09-13T09:41:10.657924
  
10134 / tcp
-999008516 | 2024-08-28T21:17:29.635437
  
10143 / tcp
-201102356 | 2024-09-12T22:38:21.729726
  
10243 / tcp
-1590966550 | 2024-09-13T13:35:03.578806
  
10250 / tcp
1992236507 | 2024-09-13T10:18:09.757184
  
10443 / tcp
434056479 | 2024-09-13T11:52:44.542128
  
10554 / tcp
0 | 2024-08-30T16:57:01.882131
  
10909 / tcp
0 | 2024-09-06T14:00:34.855969
  
10911 / tcp
-524839487 | 2024-09-13T05:21:17.041298
  
11000 / tcp
-1729643016 | 2024-09-13T05:23:38.894260
  
11112 / tcp
1599425307 | 2024-09-13T07:49:36.131193
  
11210 / tcp
-1229395070 | 2024-09-13T13:02:03.173500
  
11211 / tcp
-701599189 | 2024-09-13T06:16:30.332801
  
11300 / tcp
-1315729184 | 2024-09-13T04:58:49.276843
  
11371 / tcp
244769283 | 2024-08-27T09:14:10.672636
  
11434 / tcp
118678517 | 2024-09-13T07:42:50.160815
  
12000 / tcp
-1006986421 | 2024-08-27T17:55:45.808758
  
12235 / tcp
-1090827166 | 2024-09-13T06:00:01.697515
  
13579 / tcp
-717151964 | 2024-09-13T05:08:18.687091
  
14147 / tcp
-1055776097 | 2024-09-13T05:39:27.314793
  
14265 / tcp
-1323302264 | 2024-09-07T22:18:42.873232
  
14344 / tcp
-1116085590 | 2024-08-22T17:47:48.572231
  
15301 / tcp
-1586609078 | 2024-08-16T19:07:35.312019
  
15443 / tcp
-35978796 | 2024-08-15T08:56:14.599885
  
16010 / tcp
-1219415871 | 2024-09-02T18:24:05.586854
  
16030 / tcp
502104890 | 2024-09-03T21:17:39.394785
  
16285 / tcp
-655057498 | 2024-08-23T05:08:06.178502
  
16670 / tcp
1560719926 | 2024-09-13T06:03:46.478070
  
16992 / tcp
-743661865 | 2024-09-12T05:24:09.072977
  
16993 / tcp
-2101259082 | 2024-09-13T10:06:46.232599
  
17000 / tcp
-1404104280 | 2024-09-13T13:32:50.840370
  
18081 / tcp
191752421 | 2024-09-13T07:25:50.110997
  
18245 / tcp
1804993792 | 2024-08-14T23:47:40.905701
  
18443 / tcp
118678517 | 2024-08-23T01:00:49.497344
  
18553 / tcp
-1803690704 | 2024-09-13T07:49:03.412525
  
19000 / tcp
827069115 | 2024-09-13T07:51:40.238457
  
19071 / tcp
-795226853 | 2024-08-22T21:36:48.637656
  
19930 / tcp
-726391219 | 2024-09-13T05:46:47.119016
  
20000 / tcp
633538019 | 2024-09-13T08:45:29.657782
  
20256 / tcp
1614756142 | 2024-09-13T10:11:08.319859
  
20547 / tcp
-322426666 | 2024-08-30T04:53:34.914740
  
20880 / tcp
1634975959 | 2024-09-13T09:27:42.809160
  
21025 / tcp
-1242934909 | 2024-08-24T17:18:38.106963
  
21027 / tcp
-1956188964 | 2024-09-13T12:01:30.808839
  
21379 / tcp
92308690 | 2024-08-24T20:47:10.439527
  
22000 / tcp
1757937021 | 2024-09-04T15:41:31.167970
  
22067 / tcp
-1909694290 | 2024-08-21T16:00:46.280718
  
22069 / tcp
1120340395 | 2024-08-21T18:55:06.969878
  
22070 / tcp
1989801802 | 2024-09-05T04:02:46.852288
  
22222 / tcp
1565089800 | 2024-09-13T05:25:53.528740
  
23023 / tcp
1887422145 | 2024-09-13T14:10:58.220389
  
23424 / tcp
-395367810 | 2024-09-13T14:00:38.703126
  
25001 / tcp
-2101259082 | 2024-09-13T10:59:01.101996
  
25105 / tcp
-1881552390 | 2024-09-13T12:48:05.234904
  
25565 / tcp
-1630162410 | 2024-08-17T18:14:33.121445
  
26656 / tcp
-68935157 | 2024-08-17T15:00:41.653662
  
26657 / tcp
1850905536 | 2024-09-13T10:29:29.061664
  
27015 / tcp
-1055776097 | 2024-09-13T13:54:39.829729
  
27017 / tcp
-483874377 | 2024-08-22T16:28:53.404973
  
28000 / tcp
-1376554993 | 2024-09-13T13:30:21.155848
  
28015 / tcp
626419040 | 2024-09-13T14:15:12.835014
  
28017 / tcp
641283299 | 2024-09-13T04:41:31.363023
  
30002 / tcp
1336362323 | 2024-09-13T03:52:25.249120
  
30003 / tcp
201491057 | 2024-08-20T11:53:39.674776
  
30301 / tcp
-1455629721 | 2024-08-21T07:34:35.599085
  
30303 / tcp
899337393 | 2024-09-13T09:34:28.017734
  
31337 / tcp
1204766608 | 2024-08-29T10:10:13.869517
  
31401 / tcp
1460487964 | 2024-08-17T06:28:40.292459
  
31443 / tcp
993325534 | 2024-09-13T05:55:21.938824
  
32400 / tcp
1323783165 | 2024-09-13T08:55:02.896752
  
32764 / tcp
-117317849 | 2024-09-13T13:50:39.853487
  
33060 / tcp
806897249 | 2024-08-20T14:48:10.396421
  
33445 / tcp
-395367810 | 2024-09-13T07:05:26.990844
  
35000 / tcp
1091720755 | 2024-09-13T06:58:19.211763
  
37215 / tcp
-395367810 | 2024-09-13T09:38:41.086834
  
37777 / tcp
489882802 | 2024-08-17T23:06:38.131237
  
38333 / tcp
633538019 | 2024-09-12T18:05:19.848596
  
39277 / tcp
1228721859 | 2024-08-17T02:52:40.103009
  
41443 / tcp
-1648763127 | 2024-09-13T10:51:54.298027
  
41800 / tcp
716214331 | 2024-08-16T02:23:53.655958
  
42113 / tcp
-776839418 | 2024-09-03T19:20:07.569701
  
42398 / tcp
118678517 | 2024-08-23T17:01:46.745449
  
43118 / tcp
836349210 | 2024-09-13T12:43:25.311313
  
44158 / tcp
892873338 | 2024-09-13T07:43:09.994059
  
44818 / tcp
-563020949 | 2024-09-11T16:48:10.789552
  
47990 / tcp
-1646245024 | 2024-09-13T12:00:14.410799
  
49152 / tcp
-280008540 | 2024-09-13T09:41:47.887788
  
49153 / tcp
-1288692688 | 2024-09-13T08:37:49.418727
  
50000 / tcp
1323783165 | 2024-09-13T13:27:06.393197
  
50050 / tcp
1037768380 | 2024-09-13T05:44:51.271240
  
50070 / tcp
504577766 | 2024-09-13T13:59:40.458096
  
50100 / tcp
1472124482 | 2024-08-22T20:04:45.389593
  
50719 / tcp
933107212 | 2024-09-13T10:53:41.612441
  
51106 / tcp
245676909 | 2024-09-13T12:37:47.344896
  
51235 / tcp
-1881552390 | 2024-08-15T19:32:53.238033
  
51413 / tcp
-721114820 | 2024-08-16T23:07:22.650197
  
51443 / tcp
-909278985 | 2024-09-13T11:24:35.564978
  
52311 / tcp
185239291 | 2024-09-13T11:58:45.435903
  
52869 / tcp
-82669925 | 2024-09-13T05:51:29.278151
  
54138 / tcp
-1006986421 | 2024-09-05T04:04:56.057832
  
54321 / tcp
421466966 | 2024-08-28T19:19:51.163411
  
54361 / tcp
1880141625 | 2024-09-13T09:48:29.704840
  
55000 / tcp
631104875 | 2024-09-13T05:42:18.955088
  
55442 / tcp
-1542093547 | 2024-09-12T08:28:55.129615
  
55443 / tcp
-2101259082 | 2024-09-13T03:05:34.288381
  
55553 / tcp
-2072035691 | 2024-09-13T08:32:02.561228
  
55554 / tcp
-1252295076 | 2024-09-13T09:52:55.284415
  
60001 / tcp
-67979680 | 2024-09-13T05:44:08.826117
  
60010 / tcp
848365080 | 2024-09-02T02:43:01.581439
  
60030 / tcp
752487971 | 2024-09-03T23:19:50.044013
  
60567 / tcp
-819464190 | 2024-09-13T08:56:23.931506
  
61613 / tcp
-224996309 | 2024-09-13T09:19:53.573018
  
61616 / tcp
-1823252948 | 2024-09-13T12:54:12.295415
  
62078 / tcp
-741895853 | 2024-08-23T15:34:34.156796
  
62200 / tcp
-82115498 | 2024-08-31T22:56:10.943066
  
63210 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2020-7071":{"cvss":5.0,"ports":[8602],"summary":"In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.","verified":false},"CVE-2020-7070":{"cvss":5.0,"ports":[8602],"summary":"In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.","verified":false},"CVE-2020-7069":{"cvss":6.4,"ports":[8602],"summary":"In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.","verified":false},"CVE-2020-7068":{"cvss":3.3,"ports":[8602],"summary":"In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.","verified":false},"CVE-2019-20372":{"cvss":4.3,"ports":[143,1925,2003,2087,2126,8425,9012,14147,30303],"summary":"NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[2083,2211,23023],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2019-11072":{"cvss":7.5,"ports":[9001],"summary":"lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states \"The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.","verified":false},"CVE-2019-10247":{"cvss":5.0,"ports":[3402,4782,8834],"summary":"In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.","verified":false},"CVE-2019-9641":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.","verified":false},"CVE-2019-9639":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.","verified":false},"CVE-2019-9638":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.","verified":false},"CVE-2019-9637":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.","verified":false},"CVE-2019-9516":{"cvss":6.8,"ports":[143,1925,2003,2087,2126,8425,9012,14147],"summary":"Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.","verified":false},"CVE-2019-9513":{"cvss":7.8,"ports":[143,1925,2003,2087,2126,8425,9012,14147],"summary":"Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.","verified":false},"CVE-2019-9511":{"cvss":7.8,"ports":[143,1925,2003,2087,2126,8425,9012,14147],"summary":"Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.","verified":false},"CVE-2019-9024":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.","verified":false},"CVE-2019-9023":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.","verified":false},"CVE-2019-9021":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.","verified":false},"CVE-2019-9020":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.","verified":false},"CVE-2019-6977":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.","verified":false},"CVE-2019-6111":{"cvss":5.8,"ports":[2222],"summary":"An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).","verified":false},"CVE-2019-6110":{"cvss":4.0,"ports":[2222],"summary":"In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.","verified":false},"CVE-2019-6109":{"cvss":4.0,"ports":[2222],"summary":"An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.","verified":false},"CVE-2018-20783":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.","verified":false},"CVE-2018-20685":{"cvss":2.6,"ports":[2222],"summary":"In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.","verified":false},"CVE-2018-19935":{"cvss":5.0,"ports":[143,2126],"summary":"ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.","verified":false},"CVE-2018-19520":{"cvss":6.5,"ports":[143,263,2126,9001,23023],"summary":"An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.","verified":false},"CVE-2018-19518":{"cvss":8.5,"ports":[143,2126],"summary":"University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a \"-oProxyCommand\" argument.","verified":false},"CVE-2018-19396":{"cvss":5.0,"ports":[143,263,2126,9001,23023],"summary":"ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.","verified":false},"CVE-2018-19395":{"cvss":5.0,"ports":[143,263,2126,9001,23023],"summary":"ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM(\"WScript.Shell\").","verified":false},"CVE-2018-19052":{"cvss":5.0,"ports":[9001],"summary":"An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.","verified":false},"CVE-2018-17188":{"cvss":6.5,"ports":[5984],"summary":"Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities.","verified":false},"CVE-2018-17082":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a \"Transfer-Encoding: chunked\" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.","verified":false},"CVE-2018-16845":{"cvss":5.8,"ports":[143,1925,2003,2087,2126,8425,9012,14147],"summary":"nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.","verified":false},"CVE-2018-16844":{"cvss":7.8,"ports":[143,1925,2003,2087,2126,8425,9012,14147],"summary":"nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.","verified":false},"CVE-2018-16843":{"cvss":7.8,"ports":[1925,2003,2087,8425,9012,14147],"summary":"nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.","verified":false},"CVE-2018-15919":{"cvss":5.0,"ports":[2222],"summary":"Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'","verified":false},"CVE-2018-15473":{"cvss":5.0,"ports":[2222],"summary":"OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.","verified":false},"CVE-2018-15132":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.","verified":false},"CVE-2018-14883":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.","verified":false},"CVE-2018-14851":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.","verified":false},"CVE-2018-11769":{"cvss":9.0,"ports":[5984],"summary":"CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.","verified":false},"CVE-2018-10549":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\\0' character.","verified":false},"CVE-2018-10548":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.","verified":false},"CVE-2018-10547":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.","verified":false},"CVE-2018-10546":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.","verified":false},"CVE-2018-10545":{"cvss":1.9,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.","verified":false},"CVE-2018-8007":{"cvss":9.0,"ports":[5984],"summary":"Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.","verified":false},"CVE-2018-7584":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.","verified":false},"CVE-2018-5712":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.","verified":false},"CVE-2018-5711":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.","verified":false},"CVE-2017-20005":{"cvss":7.5,"ports":[143,1925,2003,2126,8425,9012],"summary":"NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.","verified":false},"CVE-2017-16642":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.","verified":false},"CVE-2017-15906":{"cvss":5.0,"ports":[2222],"summary":"The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.","verified":false},"CVE-2017-12933":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.","verified":false},"CVE-2017-12868":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.","verified":false},"CVE-2017-12636":{"cvss":9.0,"ports":[5984],"summary":"CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.","verified":false},"CVE-2017-12635":{"cvss":10.0,"ports":[5984],"summary":"Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.","verified":false},"CVE-2017-11628":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.","verified":false},"CVE-2017-11147":{"cvss":6.4,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.","verified":false},"CVE-2017-11145":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.","verified":false},"CVE-2017-11144":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.","verified":false},"CVE-2017-11143":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.","verified":false},"CVE-2017-11142":{"cvss":7.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.","verified":false},"CVE-2017-9735":{"cvss":5.0,"ports":[119,3402,4782,8834],"summary":"Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.","verified":false},"CVE-2017-9229":{"cvss":5.0,"ports":[143,2126],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.","verified":false},"CVE-2017-9228":{"cvss":7.5,"ports":[143,2126],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.","verified":false},"CVE-2017-9227":{"cvss":7.5,"ports":[143,2126],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.","verified":false},"CVE-2017-9226":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.","verified":false},"CVE-2017-9224":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.","verified":false},"CVE-2017-9120":{"cvss":7.5,"ports":[8602],"summary":"PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.","verified":false},"CVE-2017-9118":{"cvss":5.0,"ports":[8602],"summary":"PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.","verified":false},"CVE-2017-9067":{"cvss":4.4,"ports":[23023],"summary":"In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.","verified":false},"CVE-2017-8923":{"cvss":7.5,"ports":[143,263,2126,8064,8442,8602,9001,23023],"summary":"The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.","verified":false},"CVE-2017-7963":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating \"There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.","verified":false},"CVE-2017-7890":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.","verified":false},"CVE-2017-7658":{"cvss":7.5,"ports":[119,3402,4782,8834],"summary":"In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.","verified":false},"CVE-2017-7657":{"cvss":7.5,"ports":[119,3402,4782,8834],"summary":"In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.","verified":false},"CVE-2017-7656":{"cvss":5.0,"ports":[119,3402,4782,8834],"summary":"In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.","verified":false},"CVE-2017-7529":{"cvss":5.0,"ports":[143,2003,2126,8425,9012],"summary":"Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.","verified":false},"CVE-2017-7272":{"cvss":5.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.","verified":false},"CVE-2016-20012":{"cvss":4.3,"ports":[2222],"summary":"OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product","verified":false},"CVE-2016-10712":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a \"$uri = stream_get_meta_data(fopen($file, \"r\"))['uri']\" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.","verified":false},"CVE-2016-10397":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).","verified":false},"CVE-2016-10161":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.","verified":false},"CVE-2016-10160":{"cvss":7.5,"ports":[143,2126],"summary":"Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.","verified":false},"CVE-2016-10159":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.","verified":false},"CVE-2016-10158":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.","verified":false},"CVE-2016-9935":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.","verified":false},"CVE-2016-9934":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.","verified":false},"CVE-2016-9933":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.","verified":false},"CVE-2016-9138":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.","verified":false},"CVE-2016-9137":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.","verified":false},"CVE-2016-8670":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.","verified":false},"CVE-2016-7568":{"cvss":7.5,"ports":[143,2126],"summary":"Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.","verified":false},"CVE-2016-7478":{"cvss":5.0,"ports":[143,263,2126,9001,23023],"summary":"Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.","verified":false},"CVE-2016-7418":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.","verified":false},"CVE-2016-7417":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.","verified":false},"CVE-2016-7416":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.","verified":false},"CVE-2016-7414":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.","verified":false},"CVE-2016-7413":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.","verified":false},"CVE-2016-7412":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.","verified":false},"CVE-2016-7411":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.","verified":false},"CVE-2016-7132":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.","verified":false},"CVE-2016-7131":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character.","verified":false},"CVE-2016-7130":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.","verified":false},"CVE-2016-7129":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.","verified":false},"CVE-2016-7128":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.","verified":false},"CVE-2016-7127":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.","verified":false},"CVE-2016-7126":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.","verified":false},"CVE-2016-7125":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.","verified":false},"CVE-2016-7124":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.","verified":false},"CVE-2016-6297":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.","verified":false},"CVE-2016-6296":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.","verified":false},"CVE-2016-6295":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.","verified":false},"CVE-2016-6294":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.","verified":false},"CVE-2016-6292":{"cvss":4.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.","verified":false},"CVE-2016-6291":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.","verified":false},"CVE-2016-6290":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.","verified":false},"CVE-2016-6289":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.","verified":false},"CVE-2016-6288":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.","verified":false},"CVE-2016-6207":{"cvss":4.3,"ports":[143,2126,9001],"summary":"Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.","verified":false},"CVE-2016-6174":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"applications/core/modules/front/system/content.php in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.1.13, when used with PHP before 5.4.24 or 5.5.x before 5.5.8, allows remote attackers to execute arbitrary code via the content_class parameter.","verified":false},"CVE-2016-6128":{"cvss":5.0,"ports":[143,2126],"summary":"The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.","verified":false},"CVE-2016-5773":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.","verified":false},"CVE-2016-5772":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.","verified":false},"CVE-2016-5771":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.","verified":false},"CVE-2016-5770":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.","verified":false},"CVE-2016-5769":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.","verified":false},"CVE-2016-5768":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.","verified":false},"CVE-2016-5767":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.","verified":false},"CVE-2016-5766":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.","verified":false},"CVE-2016-5399":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.","verified":false},"CVE-2016-5385":{"cvss":5.1,"ports":[143,2126,9001],"summary":"PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an \"httpoxy\" issue.","verified":false},"CVE-2016-5116":{"cvss":6.4,"ports":[9001],"summary":"gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.","verified":false},"CVE-2016-5114":{"cvss":6.4,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.","verified":false},"CVE-2016-5096":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.","verified":false},"CVE-2016-5095":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.","verified":false},"CVE-2016-5094":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.","verified":false},"CVE-2016-5093":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.","verified":false},"CVE-2016-4544":{"cvss":7.5,"ports":[143,2126,9001],"summary":"The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.","verified":false},"CVE-2016-4543":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.","verified":false},"CVE-2016-4542":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.","verified":false},"CVE-2016-4541":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.","verified":false},"CVE-2016-4540":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.","verified":false},"CVE-2016-4539":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.","verified":false},"CVE-2016-4538":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.","verified":false},"CVE-2016-4537":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.","verified":false},"CVE-2016-4473":{"cvss":7.5,"ports":[143,2126],"summary":"/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.","verified":false},"CVE-2016-4450":{"cvss":5.0,"ports":[143,2126,8425,9012],"summary":"os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.","verified":false},"CVE-2016-4343":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.","verified":false},"CVE-2016-4342":{"cvss":8.3,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.","verified":false},"CVE-2016-4073":{"cvss":7.5,"ports":[143,2126,9001],"summary":"Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.","verified":false},"CVE-2016-4072":{"cvss":7.5,"ports":[143,2126,9001],"summary":"The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \\0 characters by the phar_analyze_path function in ext/phar/phar.c.","verified":false},"CVE-2016-4071":{"cvss":7.5,"ports":[143,2126,9001],"summary":"Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.","verified":false},"CVE-2016-4070":{"cvss":5.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says \"Not sure if this qualifies as security issue (probably not).","verified":false},"CVE-2016-3185":{"cvss":6.4,"ports":[263,8064,8442,9001,23023],"summary":"The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.","verified":false},"CVE-2016-3171":{"cvss":6.8,"ports":[263,8064,8442,23023],"summary":"Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation.","verified":false},"CVE-2016-3167":{"cvss":6.4,"ports":[263,8064,8442,23023],"summary":"Open redirect vulnerability in the drupal_goto function in Drupal 6.x before 6.38, when used with PHP before 5.4.7, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a double-encoded URL in the \"destination\" parameter.","verified":false},"CVE-2016-3142":{"cvss":6.4,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\\x05\\x06 signature at an invalid location.","verified":false},"CVE-2016-3141":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.","verified":false},"CVE-2016-3074":{"cvss":7.5,"ports":[143,2126,9001],"summary":"Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.","verified":false},"CVE-2016-2554":{"cvss":10.0,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.","verified":false},"CVE-2016-1903":{"cvss":6.4,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.","verified":false},"CVE-2016-1283":{"cvss":7.5,"ports":[143,2126],"summary":"The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2016-1247":{"cvss":7.2,"ports":[143,2003,2126,8425,9012],"summary":"The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.","verified":false},"CVE-2016-0747":{"cvss":5.0,"ports":[143,2126,8425,9012],"summary":"The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.","verified":false},"CVE-2016-0746":{"cvss":7.5,"ports":[143,2126,8425,9012],"summary":"Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.","verified":false},"CVE-2016-0742":{"cvss":5.0,"ports":[143,2126,8425,9012],"summary":"The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.","verified":false},"CVE-2015-9253":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[2083,2211,23023],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2015-8994":{"cvss":6.8,"ports":[143,263,2126,9001,23023],"summary":"An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode (\"opcode\" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.","verified":false},"CVE-2015-8935":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.","verified":false},"CVE-2015-8879":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.","verified":false},"CVE-2015-8878":{"cvss":7.1,"ports":[9001],"summary":"main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses.","verified":false},"CVE-2015-8877":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.","verified":false},"CVE-2015-8876":{"cvss":7.5,"ports":[9001],"summary":"Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.","verified":false},"CVE-2015-8874":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.","verified":false},"CVE-2015-8873":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.","verified":false},"CVE-2015-8867":{"cvss":5.0,"ports":[9001],"summary":"The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.","verified":false},"CVE-2015-8866":{"cvss":6.8,"ports":[9001],"summary":"ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.","verified":false},"CVE-2015-8865":{"cvss":7.5,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.","verified":false},"CVE-2015-8838":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.","verified":false},"CVE-2015-8835":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.","verified":false},"CVE-2015-8394":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles the (?() and (?(R) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8393":{"cvss":5.0,"ports":[143,2126,9001],"summary":"pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.","verified":false},"CVE-2015-8391":{"cvss":9.0,"ports":[143,2126,9001],"summary":"The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8390":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8389":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8387":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8386":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-8383":{"cvss":7.5,"ports":[143,2126,9001],"summary":"PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.","verified":false},"CVE-2015-7804":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive.","verified":false},"CVE-2015-7803":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.","verified":false},"CVE-2015-7774":{"cvss":6.5,"ports":[8064,8442],"summary":"PC-EGG pWebManager before 3.3.10, and before 2.2.2 for PHP 4.x, allows remote authenticated users to execute arbitrary OS commands by leveraging the editor role.","verified":false},"CVE-2015-6838":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.","verified":false},"CVE-2015-6837":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.","verified":false},"CVE-2015-6836":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a \"type confusion\" in the serialize_function_call function.","verified":false},"CVE-2015-6835":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.","verified":false},"CVE-2015-6834":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.","verified":false},"CVE-2015-6833":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.","verified":false},"CVE-2015-6832":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.","verified":false},"CVE-2015-6831":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.","verified":false},"CVE-2015-6497":{"cvss":6.5,"ports":[263,8064,8442,9001,23023],"summary":"The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.","verified":false},"CVE-2015-5590":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.","verified":false},"CVE-2015-5589":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.","verified":false},"CVE-2015-4644":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.","verified":false},"CVE-2015-4643":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.","verified":false},"CVE-2015-4642":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function.","verified":false},"CVE-2015-4605":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a \"Python script text executable\" rule.","verified":false},"CVE-2015-4604":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a \"Python script text executable\" rule.","verified":false},"CVE-2015-4603":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a \"type confusion\" issue.","verified":false},"CVE-2015-4602":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a \"type confusion\" issue.","verified":false},"CVE-2015-4601":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to \"type confusion\" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.","verified":false},"CVE-2015-4600":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to \"type confusion\" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.","verified":false},"CVE-2015-4599":{"cvss":10.0,"ports":[263,8064,8442,9001,23023],"summary":"The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a \"type confusion\" issue.","verified":false},"CVE-2015-4598":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\\0.html attack that bypasses an intended configuration in which client users may write to only .html files.","verified":false},"CVE-2015-4148":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a \"type confusion\" issue.","verified":false},"CVE-2015-4147":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a \"type confusion\" issue.","verified":false},"CVE-2015-4116":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.","verified":false},"CVE-2015-4026":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \\x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.","verified":false},"CVE-2015-4025":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \\x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.","verified":false},"CVE-2015-4024":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.","verified":false},"CVE-2015-4022":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.","verified":false},"CVE-2015-4021":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \\0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.","verified":false},"CVE-2015-3416":{"cvss":7.5,"ports":[9001],"summary":"The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.","verified":false},"CVE-2015-3415":{"cvss":7.5,"ports":[9001],"summary":"The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.","verified":false},"CVE-2015-3414":{"cvss":7.5,"ports":[9001],"summary":"SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.","verified":false},"CVE-2015-3412":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.","verified":false},"CVE-2015-3411":{"cvss":6.4,"ports":[263,8064,8442,9001,23023],"summary":"PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.","verified":false},"CVE-2015-3330":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a \"deconfigured interpreter.\"","verified":false},"CVE-2015-3329":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.","verified":false},"CVE-2015-3307":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.","verified":false},"CVE-2015-3200":{"cvss":5.0,"ports":[9001],"summary":"mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.","verified":false},"CVE-2015-3152":{"cvss":4.3,"ports":[9001],"summary":"Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.","verified":false},"CVE-2015-2787":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.","verified":false},"CVE-2015-2783":{"cvss":5.8,"ports":[263,8064,8442,9001,23023],"summary":"ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.","verified":false},"CVE-2015-2348":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \\x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.","verified":false},"CVE-2015-2331":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.","verified":false},"CVE-2015-2326":{"cvss":4.3,"ports":[9001],"summary":"The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by \"((?+1)(\\1))/\".","verified":false},"CVE-2015-2325":{"cvss":6.8,"ports":[9001],"summary":"The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.","verified":false},"CVE-2015-2305":{"cvss":6.8,"ports":[9001],"summary":"Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.","verified":false},"CVE-2015-2301":{"cvss":7.5,"ports":[9001],"summary":"Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.","verified":false},"CVE-2015-1352":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.","verified":false},"CVE-2015-1351":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.","verified":false},"CVE-2015-0273":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.","verified":false},"CVE-2015-0235":{"cvss":10.0,"ports":[9001],"summary":"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"","verified":false},"CVE-2015-0232":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.","verified":false},"CVE-2015-0231":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.","verified":false},"CVE-2014-9912":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.","verified":false},"CVE-2014-9767":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.","verified":false},"CVE-2014-9709":{"cvss":5.0,"ports":[9001],"summary":"The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.","verified":false},"CVE-2014-9705":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.","verified":false},"CVE-2014-9653":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.","verified":false},"CVE-2014-9652":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.","verified":false},"CVE-2014-9427":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.","verified":false},"CVE-2014-9426":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via unknown vectors. NOTE: this is disputed by the vendor because the standard erealloc behavior makes the free operation unreachable","verified":false},"CVE-2014-9425":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.","verified":false},"CVE-2014-8626":{"cvss":7.5,"ports":[8064,8442],"summary":"Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding.","verified":false},"CVE-2014-8142":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.","verified":false},"CVE-2014-5459":{"cvss":3.6,"ports":[263,8064,8442,9001,23023],"summary":"The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.","verified":false},"CVE-2014-5120":{"cvss":6.4,"ports":[9001],"summary":"gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.","verified":false},"CVE-2014-4721":{"cvss":2.6,"ports":[9001,23023],"summary":"The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a \"type confusion\" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.","verified":false},"CVE-2014-4698":{"cvss":4.6,"ports":[9001],"summary":"Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.","verified":false},"CVE-2014-4670":{"cvss":4.6,"ports":[263,8064,8442,9001,23023],"summary":"Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.","verified":false},"CVE-2014-4078":{"cvss":5.1,"ports":[1741,5567,8008],"summary":"The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the \"IP Address and Domain Restrictions\" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka \"IIS Security Feature Bypass Vulnerability.\"","verified":false},"CVE-2014-4049":{"cvss":5.1,"ports":[9001,23023],"summary":"Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.","verified":false},"CVE-2014-3981":{"cvss":3.3,"ports":[263,8064,8442,9001,23023],"summary":"acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.","verified":false},"CVE-2014-3710":{"cvss":5.0,"ports":[9001],"summary":"The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.","verified":false},"CVE-2014-3670":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.","verified":false},"CVE-2014-3669":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.","verified":false},"CVE-2014-3668":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.","verified":false},"CVE-2014-3597":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.","verified":false},"CVE-2014-3587":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.","verified":false},"CVE-2014-3538":{"cvss":5.0,"ports":[9001],"summary":"file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.","verified":false},"CVE-2014-3515":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to \"type confusion\" issues in (1) ArrayObject and (2) SPLObjectStorage.","verified":false},"CVE-2014-3487":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.","verified":false},"CVE-2014-3480":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.","verified":false},"CVE-2014-3479":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.","verified":false},"CVE-2014-3478":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.","verified":false},"CVE-2014-2497":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.","verified":false},"CVE-2014-2324":{"cvss":5.0,"ports":[9001],"summary":"Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.","verified":false},"CVE-2014-2323":{"cvss":7.5,"ports":[9001],"summary":"SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.","verified":false},"CVE-2014-2270":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.","verified":false},"CVE-2014-2020":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.","verified":false},"CVE-2014-1943":{"cvss":5.0,"ports":[9001],"summary":"Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.","verified":false},"CVE-2014-0238":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.","verified":false},"CVE-2014-0237":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.","verified":false},"CVE-2014-0236":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"file before 5.18, as used in the Fileinfo component in PHP before 5.6.0, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a zero root_storage value in a CDF file, related to cdf.c and readcdf.c.","verified":false},"CVE-2014-0207":{"cvss":4.3,"ports":[263,8064,8442,9001,23023],"summary":"The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.","verified":false},"CVE-2014-0185":{"cvss":7.2,"ports":[9001,23023],"summary":"sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.","verified":false},"CVE-2013-7456":{"cvss":6.8,"ports":[143,263,2126,8064,8442,9001,23023],"summary":"gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.","verified":false},"CVE-2013-7345":{"cvss":5.0,"ports":[9001],"summary":"The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.","verified":false},"CVE-2013-7328":{"cvss":5.8,"ports":[9001],"summary":"Multiple integer signedness errors in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allow remote attackers to cause a denial of service (application crash) or obtain sensitive information via an imagecrop function call with a negative value for the (1) x or (2) y dimension, a different vulnerability than CVE-2013-7226.","verified":false},"CVE-2013-7327":{"cvss":6.8,"ports":[263,8064,8442,9001,23023],"summary":"The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.","verified":false},"CVE-2013-7226":{"cvss":6.8,"ports":[9001],"summary":"Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.","verified":false},"CVE-2013-6712":{"cvss":5.0,"ports":[263,8064,8442,9001,23023],"summary":"The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.","verified":false},"CVE-2013-6501":{"cvss":4.6,"ports":[263,8064,8442,9001,23023],"summary":"The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.","verified":false},"CVE-2013-6420":{"cvss":7.5,"ports":[263,8064,8442,9001,23023],"summary":"The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.","verified":false},"CVE-2013-4635":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.","verified":false},"CVE-2013-4560":{"cvss":5.0,"ports":[9001],"summary":"Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.","verified":false},"CVE-2013-4559":{"cvss":7.6,"ports":[9001],"summary":"lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.","verified":false},"CVE-2013-4508":{"cvss":4.3,"ports":[9001],"summary":"lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.","verified":false},"CVE-2013-4248":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.","verified":false},"CVE-2013-4113":{"cvss":6.8,"ports":[23023],"summary":"ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.","verified":false},"CVE-2013-3735":{"cvss":5.0,"ports":[8064,8442,23023],"summary":"The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says \"for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.","verified":false},"CVE-2013-2220":{"cvss":7.5,"ports":[143,263,1027,2126,8064,8442,8602,9001,23023],"summary":"Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.","verified":false},"CVE-2013-2110":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.","verified":false},"CVE-2013-1824":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.","verified":false},"CVE-2013-1643":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.","verified":false},"CVE-2013-1635":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[2211,23023],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false},"CVE-2012-4388":{"cvss":4.3,"ports":[23023],"summary":"The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.","verified":false},"CVE-2012-3450":{"cvss":2.6,"ports":[263,8064,8442,23023],"summary":"pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value.","verified":false},"CVE-2012-3365":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.","verified":false},"CVE-2012-2688":{"cvss":10.0,"ports":[263,8064,8442,23023],"summary":"Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an \"overflow.\"","verified":false},"CVE-2012-2386":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow.","verified":false},"CVE-2012-2376":{"cvss":10.0,"ports":[263,8064,8442,23023],"summary":"Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.","verified":false},"CVE-2012-2336":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.","verified":false},"CVE-2012-2311":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.","verified":false},"CVE-2012-2143":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.","verified":false},"CVE-2012-1823":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.","verified":false},"CVE-2012-1172":{"cvss":5.8,"ports":[263,8064,8442,23023],"summary":"The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.","verified":false},"CVE-2012-1171":{"cvss":5.0,"ports":[263,9001,23023],"summary":"The libxml RSHUTDOWN function in PHP 5.x allows remote attackers to bypass the open_basedir protection mechanism and read arbitrary files via vectors involving a stream_close method call during use of a custom stream wrapper.","verified":false},"CVE-2012-0831":{"cvss":6.8,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.","verified":false},"CVE-2012-0789":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Memory leak in the timezone functionality in PHP before 5.3.9 allows remote attackers to cause a denial of service (memory consumption) by triggering many strtotime function calls, which are not properly handled by the php_date_parse_tzfile cache.","verified":false},"CVE-2012-0788":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.","verified":false},"CVE-2012-0057":{"cvss":6.4,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.9 has improper libxslt security settings, which allows remote attackers to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension.","verified":false},"CVE-2011-4969":{"cvss":4.3,"ports":[2211,23023],"summary":"Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.","verified":false},"CVE-2011-4885":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.","verified":false},"CVE-2011-4718":{"cvss":6.8,"ports":[263,8064,8442,23023],"summary":"Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID.","verified":false},"CVE-2011-4566":{"cvss":6.4,"ports":[23023],"summary":"Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.","verified":false},"CVE-2011-4362":{"cvss":5.0,"ports":[9001],"summary":"Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.","verified":false},"CVE-2011-3336":{"cvss":7.8,"ports":[23023],"summary":"regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.","verified":false},"CVE-2011-3268":{"cvss":10.0,"ports":[263,8064,8442,23023],"summary":"Buffer overflow in the crypt function in PHP before 5.3.7 allows context-dependent attackers to have an unspecified impact via a long salt argument, a different vulnerability than CVE-2011-2483.","verified":false},"CVE-2011-3267":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.7 does not properly implement the error_log function, which allows context-dependent attackers to cause a denial of service (application crash) via unspecified vectors.","verified":false},"CVE-2011-3182":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.7 does not properly check the return values of the malloc, calloc, and realloc library functions, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger a buffer overflow by leveraging the ability to provide an arbitrary value for a function argument, related to (1) ext/curl/interface.c, (2) ext/date/lib/parse_date.c, (3) ext/date/lib/parse_iso_intervals.c, (4) ext/date/lib/parse_tz.c, (5) ext/date/lib/timelib.c, (6) ext/pdo_odbc/pdo_odbc.c, (7) ext/reflection/php_reflection.c, (8) ext/soap/php_sdl.c, (9) ext/xmlrpc/libxmlrpc/base64.c, (10) TSRM/tsrm_win32.c, and (11) the strtotime function.","verified":false},"CVE-2011-2483":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.","verified":false},"CVE-2011-2202":{"cvss":6.4,"ports":[263,8064,8442,23023],"summary":"The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a \"file path injection vulnerability.\"","verified":false},"CVE-2011-1939":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"SQL injection vulnerability in Zend Framework 1.10.x before 1.10.9 and 1.11.x before 1.11.6 when using non-ASCII-compatible encodings in conjunction PDO_MySql in PHP before 5.3.6.","verified":false},"CVE-2011-1938":{"cvss":7.5,"ports":[23023],"summary":"Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.","verified":false},"CVE-2011-1471":{"cvss":4.3,"ports":[8064,8442,23023],"summary":"Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.","verified":false},"CVE-2011-1470":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a ziparchive stream that is not properly handled by the stream_get_contents function.","verified":false},"CVE-2011-1469":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"Unspecified vulnerability in the Streams component in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.","verified":false},"CVE-2011-1468":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function.","verified":false},"CVE-2011-1467":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Unspecified vulnerability in the NumberFormatter::setSymbol (aka numfmt_set_symbol) function in the Intl extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument, a related issue to CVE-2010-4409.","verified":false},"CVE-2011-1466":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function.","verified":false},"CVE-2011-1464":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.","verified":false},"CVE-2011-1398":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.","verified":false},"CVE-2011-1153":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.","verified":false},"CVE-2011-1148":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.","verified":false},"CVE-2011-1092":{"cvss":7.5,"ports":[263,8064,8442,23023],"summary":"Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.","verified":false},"CVE-2011-0755":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.","verified":false},"CVE-2011-0754":{"cvss":4.4,"ports":[263,8064,8442,23023],"summary":"The SplFileInfo::getType function in the Standard PHP Library (SPL) extension in PHP before 5.3.4 on Windows does not properly detect symbolic links, which might make it easier for local users to conduct symlink attacks by leveraging cross-platform differences in the stat structure, related to lack of a FILE_ATTRIBUTE_REPARSE_POINT check.","verified":false},"CVE-2011-0753":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.","verified":false},"CVE-2011-0752":{"cvss":5.0,"ports":[8064,8442],"summary":"The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758.","verified":false},"CVE-2011-0708":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.","verified":false},"CVE-2011-0421":{"cvss":4.3,"ports":[263,8064,8442,23023],"summary":"The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.","verified":false},"CVE-2010-4700":{"cvss":6.8,"ports":[23023],"summary":"The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions.","verified":false},"CVE-2010-4699":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set.","verified":false},"CVE-2010-4698":{"cvss":5.0,"ports":[23023],"summary":"Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.","verified":false},"CVE-2010-4697":{"cvss":6.8,"ports":[8064,8442,23023],"summary":"Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference.","verified":false},"CVE-2010-4657":{"cvss":5.0,"ports":[263,23023],"summary":"PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.","verified":false},"CVE-2010-4645":{"cvss":5.0,"ports":[23023],"summary":"strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.","verified":false},"CVE-2010-4409":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.","verified":false},"CVE-2010-4156":{"cvss":5.0,"ports":[23023],"summary":"The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x through 5.3.3, allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).","verified":false},"CVE-2010-4150":{"cvss":5.0,"ports":[23023],"summary":"Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.","verified":false},"CVE-2010-3972":{"cvss":10.0,"ports":[1400,1471,3563,7443,8001,8766,8789,8889],"summary":"Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka \"IIS FTP Service Heap Buffer Overrun Vulnerability.\" NOTE: some of these details are obtained from third party information.","verified":false},"CVE-2010-3870":{"cvss":6.8,"ports":[8064,8442,23023],"summary":"The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.","verified":false},"CVE-2010-3710":{"cvss":4.3,"ports":[23023],"summary":"Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.","verified":false},"CVE-2010-3709":{"cvss":4.3,"ports":[23023],"summary":"The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.","verified":false},"CVE-2010-3436":{"cvss":5.0,"ports":[23023],"summary":"fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename.","verified":false},"CVE-2010-2950":{"cvss":6.8,"ports":[23023],"summary":"Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.","verified":false},"CVE-2010-2730":{"cvss":9.3,"ports":[1400,1471,3563,7443,8001,8766,8789,8889],"summary":"Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka \"Request Header Buffer Overflow Vulnerability.\"","verified":false},"CVE-2010-1899":{"cvss":4.3,"ports":[1400,1471,3563,7443,8001,8766,8789,8889],"summary":"Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka \"IIS Repeated Parameter Request Denial of Service Vulnerability.\"","verified":false},"CVE-2010-1130":{"cvss":5.0,"ports":[8064,8442],"summary":"session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).","verified":false},"CVE-2010-1128":{"cvss":6.4,"ports":[8064,8442],"summary":"The Linear Congruential Generator (LCG) in PHP before 5.2.13 does not provide the expected entropy, which makes it easier for context-dependent attackers to guess values that were intended to be unpredictable, as demonstrated by session cookies generated by using the uniqid function.","verified":false},"CVE-2009-5046":{"cvss":4.3,"ports":[119],"summary":"JSP Dump and Session Dump Servlet XSS in jetty before 6.1.22.","verified":false},"CVE-2009-5045":{"cvss":5.0,"ports":[119],"summary":"Dump Servlet information leak in jetty before 6.1.22.","verified":false},"CVE-2009-5016":{"cvss":6.8,"ports":[8064,8442],"summary":"Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870.","verified":false},"CVE-2009-4418":{"cvss":5.0,"ports":[263,8064,8442],"summary":"The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.","verified":false},"CVE-2009-4143":{"cvss":10.0,"ports":[8064,8442],"summary":"PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.","verified":false},"CVE-2009-4142":{"cvss":4.3,"ports":[8064,8442],"summary":"The htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.","verified":false},"CVE-2009-4018":{"cvss":7.5,"ports":[8064,8442],"summary":"The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.","verified":false},"CVE-2009-4017":{"cvss":5.0,"ports":[8064,8442],"summary":"PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive.","verified":false},"CVE-2009-3558":{"cvss":6.8,"ports":[8064,8442],"summary":"The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.","verified":false},"CVE-2009-3557":{"cvss":5.0,"ports":[8064,8442],"summary":"The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.","verified":false},"CVE-2009-3293":{"cvss":7.5,"ports":[8064,8442],"summary":"Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect \"sanity check for the color index.\"","verified":false},"CVE-2009-3292":{"cvss":7.5,"ports":[8064,8442],"summary":"Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to \"missing sanity checks around exif processing.\"","verified":false},"CVE-2009-3291":{"cvss":7.5,"ports":[8064,8442],"summary":"The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.","verified":false},"CVE-2009-2687":{"cvss":4.3,"ports":[8064,8442],"summary":"The exif_read_data function in the Exif module in PHP before 5.2.10 allows remote attackers to cause a denial of service (crash) via a malformed JPEG image with invalid offset fields, a different issue than CVE-2005-3353.","verified":false},"CVE-2009-2626":{"cvss":6.4,"ports":[8064,8442],"summary":"The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.","verified":false},"CVE-2008-7068":{"cvss":6.4,"ports":[8064,8442],"summary":"The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.","verified":false},"CVE-2008-5814":{"cvss":2.6,"ports":[8064,8442],"summary":"Cross-site scripting (XSS) vulnerability in PHP, possibly 5.2.7 and earlier, when display_errors is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: because of the lack of details, it is unclear whether this is related to CVE-2006-0208.","verified":false},"CVE-2008-5658":{"cvss":7.5,"ports":[8064,8442],"summary":"Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.","verified":false},"CVE-2008-5625":{"cvss":7.5,"ports":[8064,8442],"summary":"PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a \"php_value error_log\" entry in a .htaccess file.","verified":false},"CVE-2008-5557":{"cvss":10.0,"ports":[8064,8442],"summary":"Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.","verified":false},"CVE-2008-5498":{"cvss":5.0,"ports":[8064,8442],"summary":"Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.","verified":false},"CVE-2008-4107":{"cvss":5.1,"ports":[8064,8442],"summary":"The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce cryptographically strong random numbers, which allows attackers to leverage exposures in products that rely on these functions for security-relevant functionality, as demonstrated by the password-reset functionality in Joomla! 1.5.x and WordPress before 2.6.2, a different vulnerability than CVE-2008-2107, CVE-2008-2108, and CVE-2008-4102.","verified":false},"CVE-2008-3844":{"cvss":9.3,"ports":[2222],"summary":"Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.","verified":false},"CVE-2008-3660":{"cvss":5.0,"ports":[8064,8442],"summary":"PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.","verified":false},"CVE-2008-3659":{"cvss":6.4,"ports":[8064,8442],"summary":"Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function. NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.","verified":false},"CVE-2008-3658":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.","verified":false},"CVE-2008-2829":{"cvss":5.0,"ports":[8064,8442],"summary":"php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an \"rfc822.c legacy routine buffer overflow\" error message, related to the rfc822_write_address function.","verified":false},"CVE-2008-2666":{"cvss":5.0,"ports":[8064,8442],"summary":"Multiple directory traversal vulnerabilities in PHP 5.2.6 and earlier allow context-dependent attackers to bypass safe_mode restrictions by creating a subdirectory named http: and then placing ../ (dot dot slash) sequences in an http URL argument to the (1) chdir or (2) ftok function.","verified":false},"CVE-2008-2108":{"cvss":7.5,"ports":[8064,8442],"summary":"The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.","verified":false},"CVE-2008-2107":{"cvss":7.5,"ports":[8064,8442],"summary":"The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.","verified":false},"CVE-2008-2051":{"cvss":10.0,"ports":[8064,8442],"summary":"The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to \"incomplete multibyte chars.\"","verified":false},"CVE-2008-2050":{"cvss":10.0,"ports":[8064,8442],"summary":"Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.","verified":false},"CVE-2008-1384":{"cvss":5.0,"ports":[8064,8442],"summary":"Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).","verified":false},"CVE-2008-0599":{"cvss":10.0,"ports":[8064,8442],"summary":"The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.","verified":false},"CVE-2008-0145":{"cvss":7.5,"ports":[8064,8442],"summary":"Unspecified vulnerability in glob in PHP before 4.4.8, when open_basedir is enabled, has unknown impact and attack vectors. NOTE: this issue reportedly exists because of a regression related to CVE-2007-4663.","verified":false},"CVE-2007-6039":{"cvss":2.1,"ports":[8064,8442],"summary":"PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.","verified":false},"CVE-2007-5900":{"cvss":6.9,"ports":[8064,8442],"summary":"PHP before 5.2.5 allows local users to bypass protection mechanisms configured through php_admin_value or php_admin_flag in httpd.conf by using ini_set to modify arbitrary configuration variables, a different issue than CVE-2006-4625.","verified":false},"CVE-2007-5899":{"cvss":4.3,"ports":[8064,8442],"summary":"The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID.","verified":false},"CVE-2007-5898":{"cvss":6.4,"ports":[8064,8442],"summary":"The (1) htmlentities and (2) htmlspecialchars functions in PHP before 5.2.5 accept partial multibyte sequences, which has unknown impact and attack vectors, a different issue than CVE-2006-5465.","verified":false},"CVE-2007-5128":{"cvss":5.0,"ports":[8064,8442],"summary":"SimpNews 2.41.03 on Windows, when PHP before 5.0.0 is used, allows remote attackers to obtain sensitive information via an certain link_date parameter to events.php, which reveals the path in an error message due to an unsupported argument type for the mktime function on Windows.","verified":false},"CVE-2007-4889":{"cvss":6.8,"ports":[8064,8442],"summary":"The MySQL extension in PHP 5.2.4 and earlier allows remote attackers to bypass safe_mode and open_basedir restrictions via the MySQL (1) LOAD_FILE, (2) INTO DUMPFILE, and (3) INTO OUTFILE functions, a different issue than CVE-2007-3997.","verified":false},"CVE-2007-4887":{"cvss":4.3,"ports":[8064,8442],"summary":"The dl function in PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in the library parameter. NOTE: there are limited usage scenarios under which this would be a vulnerability.","verified":false},"CVE-2007-4840":{"cvss":5.0,"ports":[8064,8442],"summary":"PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.","verified":false},"CVE-2007-4825":{"cvss":7.5,"ports":[8064,8442],"summary":"Directory traversal vulnerability in PHP 5.2.4 and earlier allows attackers to bypass open_basedir restrictions and possibly execute arbitrary code via a .. (dot dot) in the dl function.","verified":false},"CVE-2007-4784":{"cvss":5.0,"ports":[8064,8442],"summary":"The setlocale function in PHP before 5.2.4 allows context-dependent attackers to cause a denial of service (application crash) via a long string in the locale parameter. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.","verified":false},"CVE-2007-4783":{"cvss":5.0,"ports":[8064,8442],"summary":"The iconv_substr function in PHP 5.2.4 and earlier allows context-dependent attackers to cause (1) a denial of service (application crash) via a long string in the charset parameter, probably also requiring a long string in the str parameter; or (2) a denial of service (temporary application hang) via a long string in the str parameter. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.","verified":false},"CVE-2007-4782":{"cvss":5.0,"ports":[8064,8442],"summary":"PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a \"*[1]e\" value. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.","verified":false},"CVE-2007-4670":{"cvss":5.0,"ports":[8064,8442],"summary":"Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an \"Improved fix for MOPB-03-2007,\" probably a variant of CVE-2007-1285.","verified":false},"CVE-2007-4663":{"cvss":7.5,"ports":[8064,8442],"summary":"Directory traversal vulnerability in PHP before 5.2.4 allows attackers to bypass open_basedir restrictions via unspecified vectors involving the glob function.","verified":false},"CVE-2007-4662":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.","verified":false},"CVE-2007-4660":{"cvss":7.5,"ports":[8064,8442],"summary":"Unspecified vulnerability in the chunk_split function in PHP before 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation.","verified":false},"CVE-2007-4659":{"cvss":7.5,"ports":[8064,8442],"summary":"The zend_alter_ini_entry function in PHP before 5.2.4 does not properly handle an interruption to the flow of execution triggered by a memory_limit violation, which has unknown impact and attack vectors.","verified":false},"CVE-2007-4658":{"cvss":7.5,"ports":[8064,8442],"summary":"The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.","verified":false},"CVE-2007-4657":{"cvss":7.5,"ports":[8064,8442],"summary":"Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996.","verified":false},"CVE-2007-4652":{"cvss":4.4,"ports":[8064,8442],"summary":"The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.","verified":false},"CVE-2007-4586":{"cvss":7.5,"ports":[8064,8442],"summary":"Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to the iis_getservicestate function, related to the ServiceId argument to the (1) fnStartService, (2) fnGetServiceState, (3) fnStopService, and possibly other functions.","verified":false},"CVE-2007-4441":{"cvss":4.6,"ports":[8064,8442],"summary":"Buffer overflow in php_win32std.dll in the win32std extension for PHP 5.2.0 and earlier allows context-dependent attackers to execute arbitrary code via a long string in the filename argument to the win_browse_file function.","verified":false},"CVE-2007-3998":{"cvss":5.0,"ports":[8064,8442],"summary":"The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, \"\"' argument set.","verified":false},"CVE-2007-3997":{"cvss":7.5,"ports":[8064,8442],"summary":"The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.","verified":false},"CVE-2007-3996":{"cvss":6.8,"ports":[8064,8442],"summary":"Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.","verified":false},"CVE-2007-3799":{"cvss":4.3,"ports":[8064,8442],"summary":"The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.","verified":false},"CVE-2007-3378":{"cvss":6.8,"ports":[8064,8442],"summary":"The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.","verified":false},"CVE-2007-3205":{"cvss":5.0,"ports":[143,263,1027,2126,8064,8442,8602,9001,23023],"summary":"The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.","verified":false},"CVE-2007-2872":{"cvss":6.8,"ports":[8064,8442],"summary":"Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.","verified":false},"CVE-2007-2844":{"cvss":9.3,"ports":[8064,8442],"summary":"PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.","verified":false},"CVE-2007-2768":{"cvss":4.3,"ports":[2222],"summary":"OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.","verified":false},"CVE-2007-2748":{"cvss":4.3,"ports":[8064,8442],"summary":"The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.","verified":false},"CVE-2007-2727":{"cvss":2.6,"ports":[8064,8442],"summary":"The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.","verified":false},"CVE-2007-2511":{"cvss":7.2,"ports":[8064,8442],"summary":"Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors.","verified":false},"CVE-2007-2510":{"cvss":5.1,"ports":[8064,8442],"summary":"Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to \"/\" (slash) characters.","verified":false},"CVE-2007-2509":{"cvss":2.6,"ports":[8064,8442],"summary":"CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.","verified":false},"CVE-2007-1890":{"cvss":7.5,"ports":[8064,8442],"summary":"Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.","verified":false},"CVE-2007-1888":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.","verified":false},"CVE-2007-1887":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character.","verified":false},"CVE-2007-1885":{"cvss":7.5,"ports":[8064,8442],"summary":"Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6.","verified":false},"CVE-2007-1884":{"cvss":6.8,"ports":[8064,8442],"summary":"Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary memory location.","verified":false},"CVE-2007-1883":{"cvss":7.8,"ports":[8064,8442],"summary":"PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.","verified":false},"CVE-2007-1864":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.","verified":false},"CVE-2007-1835":{"cvss":4.6,"ports":[8064,8442],"summary":"PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.","verified":false},"CVE-2007-1825":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.","verified":false},"CVE-2007-1777":{"cvss":7.5,"ports":[8064,8442],"summary":"Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.","verified":false},"CVE-2007-1718":{"cvss":7.8,"ports":[8064,8442],"summary":"CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a \"\\r\\n\\t\\n\" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.","verified":false},"CVE-2007-1717":{"cvss":5.0,"ports":[8064,8442],"summary":"The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages. NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.","verified":false},"CVE-2007-1701":{"cvss":6.8,"ports":[8064,8442],"summary":"PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with \"_SESSION|s:39:\".","verified":false},"CVE-2007-1700":{"cvss":7.5,"ports":[8064,8442],"summary":"The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.","verified":false},"CVE-2007-1583":{"cvss":6.8,"ports":[8064,8442],"summary":"The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.","verified":false},"CVE-2007-1582":{"cvss":6.8,"ports":[8064,8442],"summary":"The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error handler, which can be used to destroy and modify internal resources.","verified":false},"CVE-2007-1521":{"cvss":6.8,"ports":[8064,8442],"summary":"Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.","verified":false},"CVE-2007-1484":{"cvss":4.6,"ports":[8064,8442],"summary":"The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.","verified":false},"CVE-2007-1475":{"cvss":5.4,"ports":[8064,8442],"summary":"Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.","verified":false},"CVE-2007-1461":{"cvss":7.8,"ports":[8064,8442],"summary":"The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories.","verified":false},"CVE-2007-1460":{"cvss":5.0,"ports":[8064,8442],"summary":"The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories.","verified":false},"CVE-2007-1413":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).","verified":false},"CVE-2007-1411":{"cvss":6.8,"ports":[8064,8442],"summary":"Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.","verified":false},"CVE-2007-1396":{"cvss":6.8,"ports":[8064,8442],"summary":"The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.","verified":false},"CVE-2007-1380":{"cvss":5.0,"ports":[8064,8442],"summary":"The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.","verified":false},"CVE-2007-1379":{"cvss":5.1,"ports":[8064,8442],"summary":"The ovrimos_close function in the Ovrimos extension for PHP before 4.4.5 can trigger efree of an arbitrary address, which might allow context-dependent attackers to execute arbitrary code.","verified":false},"CVE-2007-1378":{"cvss":5.1,"ports":[8064,8442],"summary":"The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments.","verified":false},"CVE-2007-1376":{"cvss":7.5,"ports":[8064,8442],"summary":"The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.","verified":false},"CVE-2007-1375":{"cvss":5.0,"ports":[8064,8442],"summary":"Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.","verified":false},"CVE-2007-1286":{"cvss":6.8,"ports":[8064,8442],"summary":"Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.","verified":false},"CVE-2007-1285":{"cvss":5.0,"ports":[8064,8442],"summary":"The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.","verified":false},"CVE-2007-1001":{"cvss":6.8,"ports":[8064,8442],"summary":"Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.","verified":false},"CVE-2007-0988":{"cvss":4.3,"ports":[8064,8442],"summary":"The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an \"a:2147483649:{\" argument.","verified":false},"CVE-2007-0910":{"cvss":10.0,"ports":[8064,8442],"summary":"Unspecified vulnerability in PHP before 5.2.1 allows attackers to \"clobber\" certain super-global variables via unspecified vectors.","verified":false},"CVE-2007-0909":{"cvss":7.5,"ports":[8064,8442],"summary":"Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.","verified":false},"CVE-2007-0908":{"cvss":5.0,"ports":[8064,8442],"summary":"The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.","verified":false},"CVE-2007-0907":{"cvss":5.0,"ports":[8064,8442],"summary":"Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.","verified":false},"CVE-2007-0906":{"cvss":7.5,"ports":[8064,8442],"summary":"Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).","verified":false},"CVE-2007-0905":{"cvss":7.5,"ports":[8064,8442],"summary":"PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.","verified":false},"CVE-2007-0455":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.","verified":false},"CVE-2006-7243":{"cvss":5.0,"ports":[263,8064,8442,23023],"summary":"PHP before 5.3.4 accepts the \\0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\\0.jpg at the end of the argument to the file_exists function.","verified":false},"CVE-2006-7204":{"cvss":2.1,"ports":[8064,8442],"summary":"The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.","verified":false},"CVE-2006-6383":{"cvss":4.6,"ports":[8064,8442],"summary":"PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a \";\" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.","verified":false},"CVE-2006-5706":{"cvss":7.2,"ports":[8064,8442],"summary":"Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.","verified":false},"CVE-2006-5465":{"cvss":7.5,"ports":[8064,8442],"summary":"Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.","verified":false},"CVE-2006-5178":{"cvss":6.2,"ports":[8064,8442],"summary":"Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.","verified":false},"CVE-2006-4625":{"cvss":3.6,"ports":[8064,8442],"summary":"PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.","verified":false},"CVE-2006-4483":{"cvss":9.3,"ports":[8064,8442],"summary":"The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache.","verified":false},"CVE-2006-4482":{"cvss":9.3,"ports":[8064,8442],"summary":"Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.","verified":false},"CVE-2006-4433":{"cvss":7.5,"ports":[8064,8442],"summary":"PHP before 4.4.3 and 5.x before 5.1.4 does not limit the character set of the session identifier (PHPSESSID) for third party session handlers, which might make it easier for remote attackers to exploit other vulnerabilities by inserting PHP code into the PHPSESSID, which is stored in the session file. NOTE: it could be argued that this not a vulnerability in PHP itself, rather a design limitation that enables certain attacks against session handlers that do not account for this limitation.","verified":false},"CVE-2006-4020":{"cvss":4.6,"ports":[8064,8442],"summary":"scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.","verified":false},"CVE-2006-3017":{"cvss":9.3,"ports":[8064,8442],"summary":"zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.","verified":false},"CVE-2006-3011":{"cvss":4.6,"ports":[8064,8442],"summary":"The error_log function in basic_functions.c in PHP before 4.4.4 and 5.x before 5.1.5 allows local users to bypass safe mode and open_basedir restrictions via a \"php://\" or other scheme in the third argument, which disables safe mode.","verified":false},"CVE-2006-2660":{"cvss":2.1,"ports":[8064,8442],"summary":"Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.","verified":false},"CVE-2006-1608":{"cvss":2.1,"ports":[8064,8442],"summary":"The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.","verified":false},"CVE-2006-1494":{"cvss":2.6,"ports":[8064,8442],"summary":"Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.","verified":false},"CVE-2006-1490":{"cvss":5.0,"ports":[8064,8442],"summary":"PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a \"binary safety\" issue. NOTE: this issue has been referred to as a \"memory leak,\" but it is an information leak that discloses memory contents.","verified":false},"CVE-2006-1017":{"cvss":9.3,"ports":[8064,8442],"summary":"The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.","verified":false},"CVE-2006-1015":{"cvss":6.4,"ports":[8064,8442],"summary":"Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.","verified":false},"CVE-2006-1014":{"cvss":3.2,"ports":[8064,8442],"summary":"Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.","verified":false},"CVE-2006-0097":{"cvss":7.5,"ports":[8064,8442],"summary":"Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function.","verified":false},"CVE-2005-3883":{"cvss":5.0,"ports":[8064,8442],"summary":"CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the \"To\" address argument.","verified":false},"CVE-2005-3392":{"cvss":7.5,"ports":[8064,8442],"summary":"Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.","verified":false},"CVE-2005-3391":{"cvss":7.5,"ports":[8064,8442],"summary":"Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.","verified":false},"CVE-2005-3390":{"cvss":7.5,"ports":[8064,8442],"summary":"The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.","verified":false},"CVE-2005-3389":{"cvss":5.0,"ports":[8064,8442],"summary":"The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.","verified":false},"CVE-2005-3388":{"cvss":4.3,"ports":[8064,8442],"summary":"Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"","verified":false},"CVE-2005-3353":{"cvss":5.0,"ports":[8064,8442],"summary":"The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.","verified":false},"CVE-2005-3319":{"cvss":2.1,"ports":[8064,8442],"summary":"The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost.","verified":false},"CVE-2005-3054":{"cvss":2.1,"ports":[8064,8442],"summary":"fopen_wrappers.c in PHP 4.4.0, and possibly other versions, does not properly restrict access to other directories when the open_basedir directive includes a trailing slash, which allows PHP scripts in one directory to access files in other directories whose names are substrings of the original directory.","verified":false},"CVE-2004-0959":{"cvss":2.1,"ports":[8064,8442],"summary":"rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the \"$_FILES\" array to be modified.","verified":false},"CVE-2004-0958":{"cvss":5.0,"ports":[8064,8442],"summary":"php_variables.c in PHP before 5.0.2 allows remote attackers to read sensitive memory contents via (1) GET, (2) POST, or (3) COOKIE GPC variables that end in an open bracket character, which causes PHP to calculate an incorrect string length.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();