php vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://php.net|php package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Insufficient Granularity of Access Control

[,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12)
  • M
Improper Handling of Length Parameter Inconsistency

[,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12)
  • C
Command Injection

[,8.1.30)[8.2.0,8.2.24)[8.3.0,8.3.12)
  • C
Command Injection

[,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8)
  • M
Timing Attack

[,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8)
  • H
Command Injection

[,8.1.29)[8.2.0,8.2.20)[8.3.0,8.3.8)
  • C
Command Injection

[,8.1.28)[8.2.0,8.2.18)[8.3.0,8.3.6)
  • H
Out-of-bounds Write

[7.3.0,7.3.31][7.4.0,7.4.25)[8.0.0,8.0.12)
  • M
CVE-2021-21707

[7.3.0,7.3.33)[7.4.0,7.4.26)[8.0.0,8.0.13)
  • H
NULL Pointer Dereference

[,7.1.6)
  • C
Out-of-bounds Write

[,7.1.6)
  • C
Out-of-bounds Read

[,7.1.6)
  • C
Out-of-bounds Write

[,7.1.6)
  • C
Out-of-bounds Write

[,7.1.6)
  • C
Out-of-bounds Read

[,7.1.6)
  • H
Out-of-Bounds

[,5.5.38)
  • M
Out-of-Bounds

[,5.3.6)
  • H
Directory Traversal

[,5.2.7)
  • M
Denial of Service (DoS)

[,5.3.1]
  • M
Improper Input Validation

[4.3.3,5.1.4]
  • H
Access Restriction Bypass

[,5.2.7)
  • C
Out-of-bounds Read

[,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1)
  • H
Arbitrary Code Execution

[,5.2.3]
  • M
Out-of-Bounds

[,5.2.2)
  • M
Improper Input Validation

[4.0.0,4.4.8)[5.0.0,5.2.4)
  • C
Out-of-bounds Read

[7.1.0,7.1.29)[7.2.0,7.2.18)[7.3.0,7.3.5)
  • C
Out-of-Bounds

[,5.4.4)
  • M
Information Exposure

[,5.6.31)
  • H
Denial of Service (DoS)

[,5.6.31)
  • M
Directory Traversal

[,5.2.6]
  • C
Denial of Service (DoS)

[,5.5.35)
  • M
Denial of Service (DoS)

[,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13)
  • H
Remote Code Execution (RCE)

[5.2.0,5.3.2]
  • M
Out-of-Bounds

[,4.4.7)[5.2.0,5.2.2)
  • H
Arbitrary Code Execution

[,5.4.37)
  • L
Use After Free

[7.2.0,7.2.33)[7.3.0,7.3.21)[7.4.0,7.4.9)
  • H
Integer Overflow or Wraparound

[,5.5.37)
  • H
Information Exposure

[,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8)
  • M
Regular Expression Denial of Service (ReDoS)

[5.2.0,5.2.1]
  • M
Information Exposure

[,4.4.5)[5.2.0,5.2.1)
  • M
Cross-site Scripting (XSS)

[,5.4.38)
  • M
Out-of-bounds Read

[7.2.0,7.2.27)[7.3.0,7.3.14)
  • H
Access Restriction Bypass

[,4.4.4)[5.1.0,5.1.5)
  • H
Access Restriction Bypass

[,5.2.5)
  • H
Out-of-Bounds

[,5.5.32)
  • M
Arbitrary Code Execution

[4.4.4,5.2.1]
  • C
Out-of-Bounds

[,5.1.5)
  • H
Integer Overflow or Wraparound

[,5.5.37)
  • M
Denial of Service (DoS)

[,5.4.37)
  • H
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • H
Use of Externally-Controlled Format String

[5.1.0,5.1.1]
  • C
Out-of-Bounds

[,5.5.35)[5.6.0,5.6.21)[7.0.0,7.0.6)
  • H
Denial of Service (DoS)

[,7.0.2)
  • H
Denial of Service (DoS)

[,5.2.4)
  • M
Improper Input Validation

[,5.2.9)
  • M
Use of Externally-Controlled Format String

[4.4.4,5.1.6]
  • H
Remote Code Execution (RCE)

[5.3.7,5.3.8]
  • M
Out-of-bounds Read

[7.2.0,7.2.9)[7.3.0,7.3.16)[7.4.0,7.4.4)
  • M
Denial of Service (DoS)

[,5.4.32)
  • M
Arbitrary Code Execution

[4.4.2,5.1.2]
  • H
Out-of-Bounds

[,5.3.7)
  • H
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • M
Denial of Service (DoS)

[,5.3.4)
  • H
Arbitrary Code Execution

[,4.3.11)
  • H
Access Restriction Bypass

[,5.2.11)
  • M
Denial of Service (DoS)

[,5.3.4)
  • M
Denial of Service (DoS)

[4.2.2,5.0.3]
  • M
CRLF Injection

[,5.1.0)
  • H
Access Restriction Bypass

[,5.3.22)
  • H
Directory Traversal

[,5.2.4)
  • M
Out-of-Bounds

[7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8)
  • M
Out-of-Bounds

[,5.4.34)
  • M
Improper Input Validation

[4.0.0,5.2.6]
  • M
CVE-2020-7066

[7.2.0,7.2.29)[7.3.0,7.3.16)[7.4.0,7.4.4)
  • C
Denial of Service (DoS)

[,7.1.5]
  • M
Information Exposure

[5.2.0,5.3.2]
  • H
Access Restriction Bypass

[3.0.18,4.2.2]
  • H
Denial of Service (DoS)

[,4.3.0)
  • M
Information Exposure

[5.2.0,5.3.2]
  • H
Out-of-Bounds

[,3.0-40.3.fc7)
  • M
Cross-site Scripting (XSS)

[,5.6.33)[7.0.0,7.0.27)(7.1.0,7.1.13)
  • C
Integer Overflow or Wraparound

[,7.0.6)
  • M
Improper Input Validation

[7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2)
  • H
NULL Pointer Dereference

[,5.6.28)
  • M
Denial of Service (DoS)

[,4.4.1)
  • H
Cross-site Scripting (XSS)

[,5.2.7]
  • H
Symlink Attack

[,5.3.5]
  • H
Out-of-Bounds

[,4.4.9)[5.2.0,5.2.6)
  • M
Improper Input Validation

[,5.4.35)[5.5.0,5.5.19)[5.6.0,5.6.3)[5.0,5.22)
  • C
Use After Free

[5.6.0,5.6.1)
  • M
Denial of Service (DoS)

[,5.5.15)
  • M
Access Restriction Bypass

[5.3.0,5.3.3]
  • M
Improper Input Validation

[,5.3.13)
  • H
CVE-2007-2844

[,5.2.1)
  • H
Out-of-Bounds

[,5.2.1)
  • C
Out-of-Bounds

[,5.6.28)
  • M
Arbitrary Code Execution

[,4.4.5)
  • C
Denial of Service (DoS)

[,5.6.7)
  • M
CVE-2004-0959

[,5.0.3)
  • C
Denial of Service (DoS)

[,7.0.4)
  • M
Improper Input Validation

[,5.3.6)
  • M
Information Exposure

[5.2.0,5.3.2]
  • M
CVE-2007-1583

[4.0,5.2.1]
  • H
Access Restriction Bypass

[,5.2.1)
  • H
Deserialization of Untrusted Data

[,5.2.1]
  • M
Denial of Service (DoS)

[,4.4.1)[5.0.0,5.1.0)
  • C
Out-of-Bounds

[,5.5.33)
  • M
CVE-2006-4625

[4.0,5.1.6]
  • M
Symlink Attack

[,5.2.4)
  • C
Integer Overflow or Wraparound

[,7.0.15)[7.1.0,7.1.1)
  • M
Improper Input Validation

[,5.3.12)
  • C
Denial of Service (DoS)

[,5.4.45)
  • C
Use After Free

[,5.6.27)
  • H
NULL Pointer Dereference

[7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3)
  • M
Access Restriction Bypass

[,5.2.3)
  • C
Use After Free

[,5.6.23)
  • H
Improper Data Handling

[,5.4.41)
  • M
Improper Input Validation

[,5.4.18)
  • M
Arbitrary Code Execution

[4.0.0,5.1.0]
  • M
Improper Input Validation

[,5.2.5)
  • M
Arbitrary Code Execution

[3.0,5.1.2]
  • H
Out-of-Bounds

[,5.4.38)
  • H
Denial of Service (DoS)

[,7.0.1)
  • H
Out-of-Bounds

[,5.6.26)
  • M
Denial of Service (DoS)

[,4.3.11)
  • M
Remote Code Execution (RCE)

[,5.2.3]
  • H
Denial of Service (DoS)

[,5.4.39)
  • H
NULL Pointer Dereference

[5.0.0,5.6.40)[7.0.0,7.3.0)
  • L
Improper Input Validation

[,4.4.7)[5.2.0,5.2.2)
  • H
Out-of-bounds Read

[,5.5.36)
  • M
Use of Externally-Controlled Format String

[,5.3.4)
  • M
Improper Input Validation

[0,)
  • H
Improper Input Validation

[,5.5.32)[5.6.0,5.6.18)[7.0.0,7.0.3)
  • M
Access Restriction Bypass

[,5.5.2)
  • L
Denial of Service (DoS)

[,5.1.6)
  • M
Cryptographic Issues

[,5.2.13)
  • M
Information Exposure

[,5.2.11)
  • C
Denial of Service (DoS)

[,7.0.4)
  • H
Resource Management Errors

[3.0.1,4.2.2]
  • M
Access Restriction Bypass

[5.2.0,5.3.2]
  • H
Out-of-Bounds

[,5.1.5)
  • H
Access Restriction Bypass

[3.0,5.0.5]
  • H
Access Restriction Bypass

[5.0.0,7.0.14]
  • C
Improper Input Validation

[,5.5.35)
  • H
Arbitrary Code Execution

[,5.2.0]
  • M
CVE-2007-1378

[,4.4.5)
  • H
Buffer Overflow

[,5.0.0)
  • H
Out-of-Bounds

[,5.6.26)
  • M
Information Exposure

[,5.2.14)[5.3.0,5.3.3)
  • M
Arbitrary Code Execution

[,5.0.5]
  • C
Remote Code Execution (RCE)

[,4.3.0)[5.0.0,5.1.6)
  • M
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • M
Improper Input Validation

[,4.4.9)[5.0.0,5.2.6)
  • M
Out-of-Bounds

[,5.4.37)
  • M
Denial of Service (DoS)

[,4.4.8][4.4.8,5.2.6)
  • M
Denial of Service (DoS)

[,4.4.7)[5.0.0,5.2.2)
  • H
Denial of Service (DoS)

[,5.6.18)
  • M
Improper Input Validation

[,5.3.4)
  • C
Out-of-bounds Read

[7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2)
  • M
Integer Overflow or Wraparound

[7.2.0,7.2.31)[7.3.0,7.3.18)[7.4.0,7.4.6)
  • H
Denial of Service (DoS)

[5.3.0,5.3.11)
  • M
Resource Management Errors

[5.2.0,5.3.2]
  • H
Use of Externally-Controlled Format String

[,5.3.6)
  • H
Out-of-Bounds

[,5.4.40)
  • H
Integer Overflow or Wraparound

[,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8)
  • H
CVE-1999-0068

[1.0,2.0]
  • H
Improper Input Validation

[,5.4.44)
  • H
Out-of-Bounds

[,5.2.3]
  • M
Information Exposure

[5.2.0,5.3.2]
  • H
Arbitrary Code Injection

[,5.6.25)
  • M
Improper Input Validation

[,5.2.5)
  • C
Out-of-Bounds

[,7.0.21)[7.1.0,7.1.7)
  • M
CVE-2002-0484

[3.0,4.1.2]
  • M
Use of Uninitialized Resource

[7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6)
  • M
Improper Input Validation

[,5.2.3]
  • M
Symlink Attack

[,5.6.1)
  • H
Arbitrary Code Execution

[,5.4.36)
  • H
Resource Management Errors

[,5.3.9]
  • C
Improper Input Validation

[,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5)
  • M
Resource Management Errors

[,5.3.29)
  • M
Denial of Service (DoS)

[,5.2.9)
  • M
Denial of Service (DoS)

[,4.4.8)
  • H
Access Restriction Bypass

[4.0,5.0.0]
  • C
Out-of-Bounds

[,5.5.31)
  • H
Remote Code Execution (RCE)

[5.0.0,5.6.39)
  • C
Out-of-Bounds

[,5.2.6)
  • M
Denial of Service (DoS)

[,5.2.1)
  • H
Out-of-bounds Read

[,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5)
  • C
Integer Overflow or Wraparound

[5.6.0,5.6.27)[7.0.0,7.0.12)
  • H
Improper Input Validation

[,5.3.12)
  • M
Improper Access Control

[,5.4.43)
  • M
Out-of-Bounds

[,5.3.29)
  • H
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • H
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • H
Out-of-Bounds

[7.1.0,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3)
  • H
Denial of Service (DoS)

[,5.4.34)
  • C
Remote Code Execution (RCE)

[4.0.0,4.3.10)[5.0.0,5.0.3)
  • H
Arbitrary Code Execution

[,4.4.5)[5.2.0,5.2.1)
  • M
Cryptographic Issues

[,5.3.14)
  • H
Denial of Service (DoS)

[4.0.0,5.2.1]
  • M
Resource Management Errors

[,5.2.15)
  • M
Denial of Service (DoS)

[,5.2.3]
  • M
Remote Code Execution (RCE)

[5.0,5.1.1]
  • H
Out-of-bounds Read

[,5.6.30)
  • M
Improper Input Validation

[,5.2.5)
  • H
Arbitrary Code Execution

[,5.2.0]
  • M
Improper Input Validation

[,5.3.4)
  • M
Access Restriction Bypass

[,4.4.7)
  • C
SQL Injection

[,5.3.6)
  • C
Denial of Service (DoS)

[,5.5.35)
  • C
Out-of-bounds Read

[,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1)
  • M
Resource Management Errors

[5.2.0,5.3.3]
  • H
Code

[,7.0.0)
  • C
Double Free

[7.3.0,7.3.14)
  • M
Out-of-Bounds

[,5.0)
  • M
Denial of Service (DoS)

[,5.2.12)[5.3.0,5.3.1)
  • H
NULL Pointer Dereference

[5.0.0,7.1.25)
  • H
Out-of-bounds Read

[7.3.0,7.3.13)
  • M
Access Restriction Bypass

[,5.3.15)
  • C
Out-of-Bounds

[,5.4.42)[5.5.0,5.5.26)[5.6.0,5.6.10)
  • M
Resource Management Errors

[,5.2.13)[5.3.0,5.3.2)
  • M
Arbitrary Code Injection

[7.2.0,7.2.27)[7.3.0,7.3.14)
  • M
Information Exposure

[5.0.0,5.5.6]
  • M
Cross-site Scripting (XSS)

[,5.2.0]
  • M
CVE-2006-2563

[4.4.2,5.1.4]
  • M
Information Exposure

[5.2.0,5.3.2]
  • M
Denial of Service (DoS)

[,5.3.5]
  • H
Improper Input Validation

[,5.2.11)
  • C
Out-of-bounds Read

[7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4)
  • H
Access Restriction Bypass

[,5.2.0)
  • M
Information Exposure

[,5.4.40)
  • C
Out-of-Bounds

[,7.0.12)
  • M
Out-of-Bounds

[,5.4.32)
  • H
Arbitrary Code Execution

[,5.4.44)
  • L
Directory Traversal

[4.0,5.1.2]
  • M
Resource Management Errors

[,5.2.15)[5.3.0,5.3.4)
  • H
Improper Data Handling

[,5.4.41)
  • H
Out-of-bounds Read

[,7.1.5]
  • H
Resource Management Errors

[,5.6.12)
  • M
Deserialization of Untrusted Data

[4.0.0,4.4.5)[5.0.0,5.2.1)
  • M
Out-of-Bounds

[,5.4.34)
  • M
Improper Input Validation

[,5.3.11)
  • M
Denial of Service (DoS)

[5.2.0,5.2.1]
  • C
Use of Externally-Controlled Format String

[,7.0.1)
  • C
CVE-2015-8880

[,7.0.1)
  • H
Out-of-bounds Read

[7.2.0,7.2.30)[7.3.0,7.3.17)[7.4.0,7.4.5)
  • M
CVE-2007-2728

[0,)
  • M
Improper Input Validation

[7.3.0,7.3.29)[7.4.0,7.4.21)[8.0.0,8.0.8)
  • C
XML External Entity (XXE) Injection

[5.5.0,5.5.22)[5.6.0,5.6.6)
  • H
Integer Overflow or Wraparound

[,5.5.36)
  • H
Arbitrary Code Execution

[3.0,4.1.2]
  • M
Use of Externally-Controlled Format String

[,5.2.11)
  • H
Out-of-bounds Read

[7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8)
  • C
Improper Input Validation

[,5.6.26)
  • C
Improper Input Validation

[,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5)
  • H
Information Exposure

[,5.1.5)
  • M
Information Exposure

[4.0,5.2.1]
  • H
CVE-2019-11044

[7.2.0,7.2.27)[7.3.0,7.3.14)
  • M
Denial of Service (DoS)

[,5.1.3)
  • M
Cross-site Scripting (XSS)

[,4.3.2)
  • C
Denial of Service (DoS)

[,5.2.12)
  • H
Use After Free

[,5.6.31)
  • H
Out-of-Bounds

[,5.6.31)
  • M
Race Condition

[,5.3.4)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Arbitrary Code Execution

[,5.4.45)
  • H
Denial of Service (DoS)

[,4.3.2)
  • C
Out-of-bounds Write

[,5.6.25)
  • M
Arbitrary Code Execution

[1.0,4.0]
  • H
SQL Injection

[,5.3.13)
  • H
Information Exposure

[,5.6.31)
  • M
Denial of Service (DoS)

[4.0,5.2.1]
  • H
Authentication Bypass

[,4.4.3)[5.1.0,5.1.4)
  • L
CVE-2007-2727

[,4.4.7)[5.2.0,5.2.1)
  • M
Cross-site Scripting (XSS)

[4.0.0,5.0.5]
  • M
Denial of Service (DoS)

[,5.4.41)
  • C
Out-of-Bounds

[0,)
  • M
Arbitrary Code Execution

[,4.4.4)
  • C
Denial of Service (DoS)

[,5.4.40)
  • M
Improper Input Validation

[4.4.0,5.2.0]
  • M
Out-of-Bounds

[,5.5.7)
  • M
Directory Traversal

[,5.5.0)
  • C
Arbitrary Code Execution

[5.2.0,5.2.1]
  • C
Out-of-Bounds

[,5.6.30)
  • M
Improper Input Validation

[,5.3.9)
  • M
Use of Externally-Controlled Format String

[,5.3.3)
  • L
Buffer Overflow

[,5.1.5)
  • H
NULL Pointer Dereference

[,5.6.25)
  • M
Access Restriction Bypass

[,5.2.12)
  • M
Authentication Bypass

[4.0.7,4.4.6)[,5.2.2)
  • C
Out-of-bounds Read

[,5.5.38)
  • H
CVE-2009-3292

[,5.2.11)
  • M
Denial of Service (DoS)

[,5.3.6)
  • H
Out-of-Bounds

[,4.4.3)
  • M
Arbitrary Code Execution

[,4.4.7)
  • C
CVE-2007-0910

[,5.2.1)
  • M
Directory Traversal

[7.3.0,7.3.31)[7.4.0,7.4.24)[8.0.0,8.0.11)
  • M
Denial of Service (DoS)

[,5.2.1)
  • C
Out-of-bounds Read

[7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6)
  • M
CVE-2005-3389

[4.0.0,5.0.5]
  • M
Arbitrary Code Execution

[,5.2.1)
  • H
Denial of Service (DoS)

[4.2.0,4.2.1]
  • M
Arbitrary Code Execution

[,4.4.7)
  • H
Access Restriction Bypass

[,4.4.7)
  • C
Use After Free

[,5.5.38)
  • M
Cross-site Scripting (XSS)

[4.4.4,6.0]
  • C
Out-of-Bounds

[,5.5.38)
  • M
Denial of Service (DoS)

[,5.3.6)
  • H
Access Restriction Bypass

[,5.4.28)[5.5.0,5.5.12)
  • M
Denial of Service (DoS)

[4.0,4.1.2]
  • M
CVE-2007-5898

[,5.2.5)
  • H
Argument Injection

[5.6.0,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13)
  • M
Improper Input Validation

[5.2.0,5.3.3]
  • H
NULL Pointer Dereference

[7.3.0,7.3.27)[7.4.0,7.4.15)[8.0.0,8.0.2)
  • M
Arbitrary Code Execution

[,4.4.5)
  • C
Use After Free

[,7.0.15)[7.1.0,7.1.1)
  • C
Out-of-bounds Write

[7.1.0,7.1.33)[7.2.0,7.2.24)[7.3.0,7.3.11)
  • H
CVE-2007-4658

[,4.4.8)[5.2.0,5.2.4)
  • M
Denial of Service (DoS)

[,5.3.6)
  • C
Arbitrary Code Execution

[,5.2.6)
  • M
Information Exposure

[,5.0.3)
  • C
Out-of-Bounds

[,5.6.26)
  • M
CVE-2007-3205

[0,)
  • H
Denial of Service (DoS)

[,5.6.30)
  • M
Information Exposure

[5.2.0,5.3.2]
  • H
Directory Traversal

[,5.4.44)
  • M
Improper Input Validation

[,5.3.11)
  • C
Out-of-bounds Read

[7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3)
  • H
Out-of-Bounds

[,5.2.7)
  • H
Out-of-Bounds

[,5.6.26)
  • M
Improper Input Validation

[,5.3.8]
  • M
Arbitrary Code Injection

[,5.6.8)
  • M
Resource Management Errors

[,5.3.6]
  • M
Denial of Service (DoS)

[,5.6.8)
  • C
Denial of Service (DoS)

[,5.4.44)
  • M
Arbitrary Code Execution

[4.0,5.1.4]
  • M
Resource Management Errors

[,5.3.6)
  • M
Access Restriction Bypass

[4.0.4pl1,4.0.5]
  • C
Out-of-bounds Read

[7.1.0,7.1.28)[7.2.9,7.2.17)[7.3.0,7.3.4)
  • M
Denial of Service (DoS)

[,4.2.2)
  • M
Improper Input Validation

[,5.2.15)
  • M
Out-of-Bounds

[,5.4.30)
  • M
Denial of Service (DoS)

[,5.3.6)
  • H
Arbitrary Code Execution

[,4.3.1]
  • H
Race Condition

[,5.2.0)
  • H
Improper Input Validation

[7.0.0,7.0.16)
  • H
Remote Code Execution (RCE)

[5.0.0,5.3.2]
  • M
Denial of Service (DoS)

[,4.3.0)
  • H
Out-of-Bounds

[,5.4.40)
  • H
Denial of Service (DoS)

[,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5)
  • C
Denial of Service (DoS)

[5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12)
  • H
Access Restriction Bypass

[5.3.12,5.4.2]
  • M
Denial of Service (DoS)

[,4.3.1)
  • M
Information Exposure

[5.2.0,5.3.2]
  • M
Improper Input Validation

[,5.4.40)
  • M
Access Restriction Bypass

[,5.2.4]
  • M
Resource Management Errors

[,5.4.27)
  • H
Out-of-Bounds

[,5.3.28)
  • H
Improper Input Validation

[,5.6.28)
  • C
Out-of-Bounds

[,5.6.26)
  • M
Resource Management Errors

[,5.3.9)
  • M
NULL Pointer Dereference

[,5.5.38)
  • H
Denial of Service (DoS)

[,5.3.13)
  • M
Denial of Service (DoS)

[,5.5.10)
  • M
Out-of-Bounds

[,5.3.27)
  • L
Cross-site Scripting (XSS)

[4.0,5.1.1]
  • H
Access Restriction Bypass

[,5.2.7)
  • H
Arbitrary Code Execution

[,5.4.30)
  • M
Cryptographic Issues

[,5.3.7]
  • M
Denial of Service (DoS)

[,5.2.2)
  • M
Denial of Service (DoS)

[,7.1.20)[7.2.0,7.2.8)
  • C
Out-of-Bounds

[,5.5.35)
  • H
Denial of Service (DoS)

[5.3.0,5.3.2]
  • C
Buffer Overflow

[,4.3.3)
  • H
Integer Overflow or Wraparound

[,5.5.36)
  • M
Directory Traversal

[,5.2.7)
  • H
NULL Pointer Dereference

[7.0.0,7.0.27)[7.1.0,7.1.13)[7.2.0,7.2.1)
  • M
Information Exposure

[,5.6.35)[7.0.0,7.0.29)[7.1.0,7.1.16)[7.2.0,7.2.4)
  • H
Improper Input Validation

[,5.4.40)
  • H
NULL Pointer Dereference

[,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5)
  • C
Use After Free

[,5.6.26)
  • H
Out-of-Bounds

[,5.2.4)
  • H
Cryptographic Issues

[5.4.0,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12)
  • H
Out-of-Bounds

[,4.4.7)[5.1.0,5.1.6][5.2.0,5.2.2)
  • C
Deserialization of Untrusted Data

[,5.6.25)
  • H
CVE-2005-3392

[,4.4.1)
  • M
Improper Input Validation

[,5.4.42)
  • C
Denial of Service (DoS)

[,5.4.40)
  • M
Denial of Service (DoS)

[,5.2.3]
  • C
Out-of-Bounds

[,5.5.34)[5.6.0,5.6.20)[7.0.0,7.0.5)
  • C
Improper Input Validation

[,4.3.10)[5.0.0,5.0.2)
  • C
Out-of-Bounds

[,5.5.38)
  • H
Denial of Service (DoS)

[,4.4.8)
  • M
Access Restriction Bypass

[4.0,4.0.4]
  • M
Information Exposure

[,5.2.9)
  • H
Out-of-bounds Read

[,5.5.36)
  • M
Denial of Service (DoS)

[,5.3.6)
  • H
Improper Input Validation

[,5.4.44)
  • H
Out-of-bounds Read

[,5.6.39)[7.0.0,7.0.33)[7.1.0,7.1.25)[7.2.0,7.2.13)
  • M
Information Exposure

[5.3.9,5.3.13]
  • M
Remote Code Execution (RCE)

[,5.2.4)
  • M
Arbitrary Code Execution

[4.4.5,4.4.6]
  • M
CVE-2007-1452

[5.0.0,5.2.0]
  • H
Use After Free

[,5.6.8)
  • M
Denial of Service (DoS)

[,5.2.11)
  • M
Improper Input Validation

[,5.2.10)
  • C
Arbitrary Code Execution

[,5.4.45)
  • H
Arbitrary Code Execution

[,5.2.0)
  • C
Out-of-Bounds

[,5.5.35)
  • H
Out-of-Bounds

[,5.3.1)
  • C
Arbitrary Code Execution

[,4.3.7)
  • M
Out-of-Bounds

[5.3.0,5.3.2]
  • H
Memory Leak

[5.0.0,5.4.4)
  • C
Buffer Overflow

[,5.3.15)
  • H
Arbitrary Code Execution

[,5.4.38)
  • M
Resource Management Errors

[,5.1.2]
  • C
Double Free

[,5.5.37)[5.6.0,5.6.23)
  • H
Denial of Service (DoS)

[,5.4.45)
  • H
Integer Overflow or Wraparound

[,5.5.38)
  • H
Out-of-Bounds

[,5.6.12)
  • C
Double Free

[,5.5.37)
  • C
Out-of-Bounds

[,5.6.34)[7.0.0,7.0.28)[7.1.0,7.1.15)[7.2.0,7.2.3)
  • C
Improper Input Validation

[,5.6.25)
  • C
Use After Free

[,7.0.14)
  • H
Denial of Service (DoS)

[,5.4.41)
  • H
Arbitrary Code Execution

[,5.4.24)
  • M
SQL Injection

[5.3.2,5.3.3]
  • C
CVE-1999-0238

[1.0,2.0]
  • C
Out-of-Bounds

[7.3.0,7.3.1)
  • H
Information Exposure

[,4.4.6]
  • M
Insecure Encryption

[7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11)
  • H
Denial of Service (DoS)

[5.5.0,5.5.22)[5.6.0,5.6.6)
  • C
Remote Code Execution (RCE)

[4.0.0,4.3.10)[5.0.0,5.0.3)
  • H
Access Restriction Bypass

[,4.4.8)
  • H
Improper Input Validation

[5.0.0,7.1.25)
  • C
Out-of-Bounds

[,5.6.31)
  • M
Access Restriction Bypass

[,4.4.3)
  • C
Use After Free

[,5.5.38)
  • H
Arbitrary Code Execution

[,5.2.1)
  • H
Improper Data Handling

[,5.4.39)
  • M
Out-of-Bounds

[,5.3.26)
  • C
Out-of-bounds Read

[,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1)
  • H
CRLF Injection

[4.0,5.2.1]
  • H
Server-side Request Forgery (SSRF)

[,7.1.4)
  • M
Out-of-Bounds

[,5.3.6)
  • H
NULL Pointer Dereference

[,5.6.30)[7.0.0,7.0.15)[7.1.0,7.1.1)
  • M
Out-of-Bounds

[5.5.0,5.5.21)[5.6.0,5.6.5)
  • H
Denial of Service (DoS)

[,5.6.28)[7.0.0,7.0.13)
  • H
Out-of-Bounds

[,5.4.37)[5.5.0,5.5.21)[5.6.0,5.6.5)
  • H
Denial of Service (DoS)

[,5.3.6)
  • M
Denial of Service (DoS)

[,5.3.7)
  • C
Denial of Service (DoS)

[,7.0.4)
  • H
Improper Input Validation

[5.6.0,5.6.25)[7.0.0,7.0.9)
  • M
Directory Traversal

[,4.3.0)
  • M
Out-of-Bounds

[5.3.0,5.3.2]
  • H
Directory Traversal

[,5.2.4)
  • M
Denial of Service (DoS)

[,5.4.30)
  • C
Integer Overflow or Wraparound

[7.0.0,7.1.6)
  • M
CVE-2002-0986

[3.0.18,4.2.2]
  • M
Access Restriction Bypass

[,5.3.7)
  • M
Information Exposure

[,5.3.22)
  • C
Denial of Service (DoS)

[,5.5.27)
  • H
Remote Code Execution (RCE)

[1.0,2.0b10]
  • H
Denial of Service (DoS)

[,5.2.1]
  • M
Cross-site Scripting (XSS)

[,5.6.38)[7.0.0,7.0.32)[7.1.0,7.1.22)[7.2.0,7.2.10)
  • M
Information Exposure

[5.2.0,5.3.2]
  • C
Out-of-Bounds

[,5.3.7)
  • H
Access Restriction Bypass

[,4.4.1)
  • C
Integer Overflow or Wraparound

[,5.5.37)
  • C
Arbitrary Code Execution

[,5.2.0]
  • M
Improper Input Validation

[,5.3.9)
  • C
Out-of-Bounds

[,5.5.32)
  • M
Improper Input Validation

[,5.4.40)
  • M
Out-of-Bounds

[5.5.0,5.5.28)[5.6.0,5.6.12)
  • C
Out-of-Bounds

[,5.5.38)
  • C
Use After Free

[,5.5.37)
  • M
Resource Management Errors

[4.4.2,5.1.2]
  • H
Out-of-Bounds

[,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3)
  • H
Directory Traversal

[,5.3.3]
  • H
CVE-2006-3017

[,4.4.3)
  • C
Use After Free

[7.2.0,7.2.8)
  • M
Cross-site Scripting (XSS)

[,5.2.12)
  • H
NULL Pointer Dereference

[,5.6.25)
  • H
Resource Management Errors

[5.2.0,5.3.2]
  • H
Out-of-Bounds

[,5.2.1)
  • M
Improper Input Validation

[,5.4.30)
  • H
Integer Overflow or Wraparound

[,7.0.10)
  • M
Improper Input Validation

[,5.5.9)
  • M
Cross-site Scripting (XSS)

[,4.2.3]
  • M
Symlink Attack

[,5.5.14)
  • H
Access Restriction Bypass

[4.0.0,4.4.8)[5.0.0,5.2.4)
  • H
Improper Access Control

[,7.0.9)
  • C
Out-of-Bounds

[,5.6.30)
  • H
Use After Free

[,7.0.21)[7.1.0,7.1.7)
  • L
Denial of Service (DoS)

[,5.3.14)
  • H
Resource Management Errors

[,5.3.7)
  • H
Out-of-bounds Read

[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.2)
  • M
Improper Input Validation

[,5.4.0]
  • M
Information Exposure

[5.3.0,5.3.2]
  • M
Out-of-Bounds

[,4.4.9)
  • M
Denial of Service (DoS)

[,5.2.4)
  • M
Denial of Service (DoS)

[4.0.0,5.2.1]
  • M
Out-of-Bounds

[,5.2.1]
  • M
Authentication Bypass

[4.0.4,4.1.2]
  • M
CVE-2005-3054

[,4.4.0]
  • H
Arbitrary Code Execution

[,5.4.44)[5.5.0,5.5.28)[5.6.0,5.6.12)
  • C
CVE-2000-0967

[3.0,4.0]
  • C
Improper Input Validation

[,7.1.6)
  • C
Out-of-Bounds

[,5.5.35)
  • C
Use After Free

[,5.6.28)
  • H
Out-of-Bounds

[,5.2.4)
  • C
Improper Input Validation

[,5.5.34)
  • H
Out-of-bounds Read

[7.2.0,7.2.27)[7.3.0,7.3.14)
  • H
Out-of-bounds Read

[7.1.0,7.1.31)[7.2.0,7.2.21)[7.3.0,7.3.8)
  • M
Information Exposure

[,5.2.5)
  • C
Out-of-Bounds

[,7.0.10)
  • H
Out-of-Bounds

[,5.5.34)
  • M
Denial of Service (DoS)

[,5.3.1)
  • M
Denial of Service (DoS)

[,5.2.17)[5.3.0,5.3.5)
  • C
Denial of Service (DoS)

[,4.3.10)
  • M
Cross-site Scripting (XSS)

[4.4.2,5.1.2]
  • H
Denial of Service (DoS)

[,5.4.45)
  • H
NULL Pointer Dereference

[,5.6.25)
  • M
Cross-site Scripting (XSS)

[,5.6.36)[7.0.0,7.0.30)[7.1.0,7.1.17)[7.2.0,7.2.5)
  • M
Information Exposure

[,5.2.2)
  • H
Buffer Overflow

[,5.2.2)
  • C
Remote Code Execution (RCE)

[,5.2.6)
  • C
Out-of-bounds Read

[,5.6.29)
  • H
Arbitrary Code Execution

[4.0,5.4.0]
  • M
Improper Input Validation

[4.0.0,5.2.14]
  • M
Improper Input Validation

[,5.4.16)
  • H
CVE-2007-1376

[,4.4.5)[5.2.0,5.2.1)
  • H
Denial of Service (DoS)

[,5.5.36)
  • H
Resource Management Errors

[,5.2.4)
  • M
Resource Management Errors

[5.2.0,5.3.2]
  • C
Integer Overflow or Wraparound

[7.1.0,7.1.30)[7.2.0,7.2.19)[7.3.0,7.3.6)
  • M
Improper Input Validation

[,5.2.5)
  • M
CVE-2007-4670

[,5.2.4)
  • M
Directory Traversal

[4.3.6,5.0.2]
  • C
Arbitrary Code Execution

[,4.3.10)
  • H
Access Restriction Bypass

[,5.1.5)
  • M
CRLF Injection

[3.0.14,4.2.3]
  • M
Out-of-Bounds

[,5.2.15)[5.3.0,5.3.4)
  • H
Out-of-Bounds

[,5.5.33)
  • L
Cross-site Scripting (XSS)

[,5.2.8)
  • H
Improper Input Validation

[,5.6.12)
  • C
Command Injection

[,5.4.42)
  • M
Access Restriction Bypass

[,5.2.13)
  • M
Information Exposure

[,5.2.2)
  • M
Improper Preservation of Permissions

[7.2.0,7.2.29)[7.3.0,7.3.15)[7.4.0,7.4.3)
  • H
Out-of-Bounds

[,5.4.43)
  • H
Denial of Service (DoS)

[,5.5.21)
  • H
Arbitrary Code Execution

[,5.4.39)
  • H
Denial of Service (DoS)

[,5.4.42)
  • M
Denial of Service (DoS)

[,4.3.3)
  • C
Improper Input Validation

[,5.4.43)
  • H
Arbitrary Code Execution

[,4.4.5)
  • C
Use After Free

[,7.0.23)[7.1.0,7.1.9)
  • M
Out-of-bounds Read

[,5.6.37)[7.0.0,7.0.31)[7.1.0,7.1.20)[7.2.0,7.2.8)
  • H
Integer Overflow or Wraparound

[,5.6.30)
  • M
Resource Management Errors

[,5.4.41)
  • M
Access Restriction Bypass

[5.2.4,5.2.5]
  • M
Information Exposure

[,5.6.25)
  • C
Denial of Service (DoS)

[,4.0]
  • M
Access Restriction Bypass

[,5.3.9)
  • C
Out-of-bounds Read

[7.2.0,7.2.27)[7.3.0,7.3.14)[7.4.0,7.4.2)
  • C
Out-of-Bounds

[4.3.0,5.2.6]
  • H
Denial of Service (DoS)

[4.3.0,4.3.2]
  • M
Denial of Service (DoS)

[,5.5.30)
  • M
Improper Input Validation

[,5.0.0)
  • H
Arbitrary Code Execution

[,4.3.0]
  • M
Access Restriction Bypass

[,5.4.39)
  • M
Resource Management Errors

[,5.3.7)
  • H
Improper Check for Unusual or Exceptional Conditions

[,5.6.31)
  • C
Out-of-Bounds

[,5.5.31)
  • M
Cryptographic Issues

[,5.3.7)
  • M
Access Restriction Bypass

[,5.2.11)
  • H
Remote Code Execution (RCE)

[,4.0.5]
  • C
Out-of-Bounds

[,5.3.29)
  • M
Denial of Service (DoS)

[,5.5.10)
  • M
Denial of Service (DoS)

[4.2.2,5.0.3]
  • H
Integer Overflow or Wraparound

[,5.5.37)
  • M
Denial of Service (DoS)

[,4.0]
  • H
Out-of-bounds Read

[,5.6.32)[7.0.0,7.0.25)[7.1.0,7.1.11)
  • M
Improper Input Validation

[,5.4.39)
  • M
Arbitrary Code Execution

[3.0,5.0]
  • C
Buffer Overflow

[,4.3.3)
  • C
Use After Free

[,5.5.37)
  • H
Out-of-Bounds

[,5.0.0]
  • H
Out-of-Bounds

[4.0.0,4.4.8)[5.0.0,5.2.4)
  • C
Out-of-bounds Write

[,5.6.25)
  • C
Out-of-Bounds

[,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3)
  • C
Integer Overflow or Wraparound

[,5.5.37)
  • M
Improper Input Validation

[,5.2.4)
  • L
Information Exposure

[,5.4.30)
  • M
Denial of Service (DoS)

[,5.5.30)
  • H
Access Restriction Bypass

[,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3)
  • H
CVE-2009-3293

[,5.2.11)
  • M
Out-of-Bounds

[,5.4.3)
  • M
CVE-2001-1385

[4.0,4.0.4]
  • M
Access Restriction Bypass

[,4.4.4)
  • C
Double Free

[,7.0.6)
  • M
Improper Input Validation

[,5.4.32)[5.5.0,5.5.16)
  • M
Out-of-Bounds

[,5.4.30)
  • C
Denial of Service (DoS)

[,5.4.40)
  • M
Information Exposure

[,5.3.22)
  • M
Information Exposure

[5.2.0,5.3.2]
  • M
Arbitrary Code Execution

[4.0,4.0.7]
  • M
Access Restriction Bypass

[4.0.0,4.4.8)[5.0.0,5.2.4)
  • M
Symlink Attack

[,5.3.4)
  • C
Denial of Service (DoS)

[,5.4.40)
  • H
Improper Input Validation

[,5.4.40)
  • H
Out-of-bounds Read

[,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)[7.3.0,7.3.1)
  • M
Out-of-Bounds

[4.0.0,4.4.5)[5.0.0,5.2.1)
  • M
Arbitrary Code Execution

[4.0.0,5.1.2]
  • M
Access Restriction Bypass

[,4.4.5)[5.2.0,5.2.1)
  • M
Resource Management Errors

[,5.3.9)
  • H
Out-of-bounds Write

[7.3.0,7.3.16)[7.4.0,7.4.4)
  • M
Denial of Service (DoS)

[,5.5.15)
  • M
Out-of-Bounds

[5.2.0,5.3.2]
  • M
Cross-site Scripting (XSS)

[4.0,5.0]
  • M
Improper Input Validation

[,5.4.30)
  • H
Improper Input Validation

[,5.4.37)
  • M
Buffer Overflow

[4.4.5,5.2.1]
  • M
Out-of-bounds Read

[7.2.0,7.2.27)[7.3.0,7.3.14)
  • H
Out-of-Bounds

[,7.1.27)[7.2.0,7.2.16)[7.3.0,7.3.3)
  • M
Information Exposure

[,5.2.14)
  • H
Improper Input Validation

[,5.2.13)
  • H
Denial of Service (DoS)

[,4.4.8)
  • M
Arbitrary Code Execution

[,5.2.0]
  • H
Access Restriction Bypass

[,5.2.5]
  • H
Out-of-bounds Write

[,5.6.40)[7.0.0,7.1.26)[7.2.0,7.2.14)
  • M
Denial of Service (DoS)

[,5.2.6)
  • H
Out-of-Bounds

[,5.2.3]
  • M
Denial of Service (DoS)

[,5.3.4)
  • M
Access Restriction Bypass

[,5.2.5)
  • M
Denial of Service (DoS)

[,5.5.9)
  • M
Out-of-Bounds

[,5.4.40)
  • H
Arbitrary Code Execution

[3.0,4.1.1]
  • M
Use of Insecure Cookies

[7.2.0,7.2.34)[7.3.0,7.3.23)[7.4.0,7.4.11)
  • M
Denial of Service (DoS)

[,5.3.26)
  • M
Improper Input Validation

[4.0.0,4.4.5)[5.0.0,5.2.1)
  • H
Out-of-Bounds

[,5.6.28)
  • H
Out-of-bounds Write

[,5.5.38)