Maxim Integrated's IoT development kit.
Dependencies: MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice
tools/Rats-2.4/rats-php.xml
- Committer:
- Mahir Ozturk
- Date:
- 2018-03-13
- Revision:
- 1:efe9cad8942f
File content as of revision 1:efe9cad8942f:
<VulnDB lang="php">
<Vulnerability>
<Name>mail</Name>
<Info>
<Severity>High</Severity>
<Description>
Arguments 1, 2, 4 and 5 of this function may be passed to an external
program. (Usually sendmail). Under Windows, they will be passed to a
remote email server. If these values are derived from user input, make
sure they are properly formatted and contain no unexpected characters or
extra data.
</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>getallheaders</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>bzread</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>fgets</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>fgetss</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>getenv</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>file</Name>
<RaceUse>1</RaceUse>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>fscanf</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzfile</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzgetc</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzgets</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzread</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzgetss</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>read</Name>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>gzopen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>eval</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>highlight_file</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>show_source</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>leak</Name>
<Info>
<Severity>Medium</Severity>
<Description>This function literally leaks memory. Are you sure you meant to use this?</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>chroot</Name>
<Info>
<Severity>Low</Severity>
<Description>Reminder: Do not forget to chdir() to an appropriate directory before calling chroot()</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>fsockopen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>Medium</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>pfsockopen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>Medium</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>posix_getlogin</Name>
<Info>
<Description> The results of this call are easy to forge.</Description>
<Severity>Medium</Severity>
</Info>
</Vulnerability>
<Vulnerability>
<Name>posix_ttyname</Name>
<Info>
<Description>
The results are easy for an attacker to forge, and not reliable.
</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>system</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>passthru</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>fopen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>bzopen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>popen</Name>
<InputProblem>
<Arg>1</Arg>
<Severity>High</Severity>
</InputProblem>
</Vulnerability>
<Vulnerability>
<Name>posix_mkfifo</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>opendir</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>exec</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>basename</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>chmod</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>chown</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>dirname</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>link</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>mkdir</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>readfile</Name>
<RaceUse>1</RaceUse>
<Input/>
</Vulnerability>
<Vulnerability>
<Name>rename</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>rmdir</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>symlink</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>unlink</Name>
<RaceUse>1</RaceUse>
</Vulnerability>
<Vulnerability>
<Name>filegroup</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>fileowner</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>fileperms</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_dir</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_executable</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_file</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_link</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_readable</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_writable</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>is_writeable</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>stat</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>lstat</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
</VulnDB>