You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 21, 2025. It is now read-only.
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
5868
5868
},
5869
5869
"CVE-2024-5458": {
@@ -5942,6 +5942,13 @@
5942
5942
"publishedDate": "2024-11-24T01:15:00+0000",
5943
5943
"lastModifiedDate": "2024-11-26T18:29:00+0000",
5944
5944
"description": "In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape()\u00a0function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write."
5945
+
},
5946
+
"CVE-2025-1217": {
5947
+
"id": "CVE-2025-1217",
5948
+
"baseScore": null,
5949
+
"publishedDate": "2025-03-29T06:15:00+0000",
5950
+
"lastModifiedDate": "2025-03-29T06:15:00+0000",
5951
+
"description": "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc."
0 commit comments