Zend » Zend Platform : Security Vulnerabilities, CVEs, CVSS score >= 3
Zend Platform 2.2.3 and earlier has incorrect ownership for scd.sh and certain other files, which allows local users to gain root privileges by modifying the files. NOTE: this only occurs when safe_mode and open_basedir are disabled; other settings require leverage for other vulnerabilities.
Max CVSS
6.2
EPSS Score
0.04%
Published
2007-03-09
Updated
2017-07-29
ini_modifier (sgid-zendtech) in Zend Platform 2.2.3 and earlier allows local users to modify the system php.ini file by editing a copy of php.ini file using the -f parameter, and then performing a symlink attack using the directory that contains the attacker-controlled php.ini file, and linking this directory to /usr/local/Zend/etc.
Max CVSS
4.4
EPSS Score
0.04%
Published
2007-03-09
Updated
2017-07-29
Directory traversal vulnerability in Zend Platform 2.2.1 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the final component of the PHP session identifier (PHPSESSID). NOTE: in some cases, this issue can be leveraged to perform direct static code injection.
Max CVSS
7.5
EPSS Score
0.51%
Published
2006-08-29
Updated
2018-10-17
Multiple buffer overflows in the (a) Session Clustering Daemon and the (b) mod_cluster module in the Zend Platform 2.2.1 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a (1) empty or (2) crafted PHP session identifier (PHPSESSID).
Max CVSS
7.5
EPSS Score
13.06%
Published
2006-08-29
Updated
2018-10-17
4 vulnerabilities found