Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-2510
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.034
EPSS Ranking
86.9%
CVSS Severity
CVSS v2 Score
5.1
References
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://osvdb.org/34675
http://secunia.com/advisories/25187
http://secunia.com/advisories/25191
http://secunia.com/advisories/25255
http://secunia.com/advisories/25318
http://secunia.com/advisories/25372
http://secunia.com/advisories/25445
http://secunia.com/advisories/26048
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://us2.php.net/releases/5_2_2.php
http://viewcvs.php.net/viewvc.cgi/php-src/ext/soap/php_http.c?r1=1.77.2.11.2.5&r2=1.77.2.11.2.6
http://www.debian.org/security/2007/dsa-1295
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
http://www.redhat.com/support/errata/RHSA-2007-0355.html
http://www.securityfocus.com/bid/23813
http://www.securityfocus.com/bid/24034
http://www.securitytracker.com/id?1018023
http://www.trustix.org/errata/2007/0017/
http://www.ubuntu.com/usn/usn-462-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10715
https://rhn.redhat.com/errata/RHSA-2007-0348.html
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://osvdb.org/34675
http://secunia.com/advisories/25187
http://secunia.com/advisories/25191
http://secunia.com/advisories/25255
http://secunia.com/advisories/25318
http://secunia.com/advisories/25372
http://secunia.com/advisories/25445
http://secunia.com/advisories/26048
http://security.gentoo.org/glsa/glsa-200705-19.xml
http://us2.php.net/releases/5_2_2.php
http://viewcvs.php.net/viewvc.cgi/php-src/ext/soap/php_http.c?r1=1.77.2.11.2.5&r2=1.77.2.11.2.6
http://www.debian.org/security/2007/dsa-1295
http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
http://www.redhat.com/support/errata/RHSA-2007-0355.html
http://www.securityfocus.com/bid/23813
http://www.securityfocus.com/bid/24034
http://www.securitytracker.com/id?1018023
http://www.trustix.org/errata/2007/0017/
http://www.ubuntu.com/usn/usn-462-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10715
https://rhn.redhat.com/errata/RHSA-2007-0348.html
Products affected by CVE-2007-2510
Php
»
Php
»
Version:
4.0.0
cpe:2.3:a:php:php:4.0.0
Php
»
Php
»
Version:
4.0.1
cpe:2.3:a:php:php:4.0.1
Php
»
Php
»
Version:
4.0.2
cpe:2.3:a:php:php:4.0.2
Php
»
Php
»
Version:
4.0.3
cpe:2.3:a:php:php:4.0.3
Php
»
Php
»
Version:
4.0.4
cpe:2.3:a:php:php:4.0.4
Php
»
Php
»
Version:
4.0.5
cpe:2.3:a:php:php:4.0.5
Php
»
Php
»
Version:
4.0.6
cpe:2.3:a:php:php:4.0.6
Php
»
Php
»
Version:
4.0.7
cpe:2.3:a:php:php:4.0.7
Php
»
Php
»
Version:
4.1.0
cpe:2.3:a:php:php:4.1.0
Php
»
Php
»
Version:
4.1.1
cpe:2.3:a:php:php:4.1.1
Php
»
Php
»
Version:
4.1.2
cpe:2.3:a:php:php:4.1.2
Php
»
Php
»
Version:
4.2.0
cpe:2.3:a:php:php:4.2.0
Php
»
Php
»
Version:
4.2.1
cpe:2.3:a:php:php:4.2.1
Php
»
Php
»
Version:
4.2.2
cpe:2.3:a:php:php:4.2.2
Php
»
Php
»
Version:
4.2.3
cpe:2.3:a:php:php:4.2.3
Php
»
Php
»
Version:
4.3.0
cpe:2.3:a:php:php:4.3.0
Php
»
Php
»
Version:
4.3.1
cpe:2.3:a:php:php:4.3.1
Php
»
Php
»
Version:
4.3.10
cpe:2.3:a:php:php:4.3.10
Php
»
Php
»
Version:
4.3.11
cpe:2.3:a:php:php:4.3.11
Php
»
Php
»
Version:
4.3.2
cpe:2.3:a:php:php:4.3.2
Php
»
Php
»
Version:
4.3.3
cpe:2.3:a:php:php:4.3.3
Php
»
Php
»
Version:
4.3.4
cpe:2.3:a:php:php:4.3.4
Php
»
Php
»
Version:
4.3.5
cpe:2.3:a:php:php:4.3.5
Php
»
Php
»
Version:
4.3.6
cpe:2.3:a:php:php:4.3.6
Php
»
Php
»
Version:
4.3.7
cpe:2.3:a:php:php:4.3.7
Php
»
Php
»
Version:
4.3.8
cpe:2.3:a:php:php:4.3.8
Php
»
Php
»
Version:
4.3.9
cpe:2.3:a:php:php:4.3.9
Php
»
Php
»
Version:
4.4.0
cpe:2.3:a:php:php:4.4.0
Php
»
Php
»
Version:
4.4.1
cpe:2.3:a:php:php:4.4.1
Php
»
Php
»
Version:
4.4.2
cpe:2.3:a:php:php:4.4.2
Php
»
Php
»
Version:
4.4.3
cpe:2.3:a:php:php:4.4.3
Php
»
Php
»
Version:
4.4.4
cpe:2.3:a:php:php:4.4.4
Php
»
Php
»
Version:
4.4.5
cpe:2.3:a:php:php:4.4.5
Php
»
Php
»
Version:
4.4.6
cpe:2.3:a:php:php:4.4.6
Php
»
Php
»
Version:
5.0
cpe:2.3:a:php:php:5.0
Php
»
Php
»
Version:
5.0.0
cpe:2.3:a:php:php:5.0.0
Php
»
Php
»
Version:
5.0.1
cpe:2.3:a:php:php:5.0.1
Php
»
Php
»
Version:
5.0.2
cpe:2.3:a:php:php:5.0.2
Php
»
Php
»
Version:
5.0.3
cpe:2.3:a:php:php:5.0.3
Php
»
Php
»
Version:
5.0.4
cpe:2.3:a:php:php:5.0.4
Php
»
Php
»
Version:
5.0.5
cpe:2.3:a:php:php:5.0.5
Php
»
Php
»
Version:
5.1.0
cpe:2.3:a:php:php:5.1.0
Php
»
Php
»
Version:
5.1.1
cpe:2.3:a:php:php:5.1.1
Php
»
Php
»
Version:
5.1.2
cpe:2.3:a:php:php:5.1.2
Php
»
Php
»
Version:
5.1.3
cpe:2.3:a:php:php:5.1.3
Php
»
Php
»
Version:
5.1.4
cpe:2.3:a:php:php:5.1.4
Php
»
Php
»
Version:
5.1.5
cpe:2.3:a:php:php:5.1.5
Php
»
Php
»
Version:
5.1.6
cpe:2.3:a:php:php:5.1.6
Php
»
Php
»
Version:
5.2.0
cpe:2.3:a:php:php:5.2.0
Php
»
Php
»
Version:
5.2.1
cpe:2.3:a:php:php:5.2.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved