Maxim Integrated's IoT development kit
Dependencies: MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice
Diff: tools/Rats-2.4/rats-php.xml
- Revision:
- 7:2c9c8b6a28a7
- Parent:
- 6:aeb5a4c194c3
- Child:
- 8:2b6bfa8d9e36
--- a/tools/Rats-2.4/rats-php.xml Tue Mar 20 16:28:33 2018 +0300 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,373 +0,0 @@ -<VulnDB lang="php"> - - - - <Vulnerability> - <Name>mail</Name> - <Info> - <Severity>High</Severity> - <Description> - Arguments 1, 2, 4 and 5 of this function may be passed to an external - program. (Usually sendmail). Under Windows, they will be passed to a - remote email server. If these values are derived from user input, make - sure they are properly formatted and contain no unexpected characters or - extra data. - </Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>getallheaders</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>bzread</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>fgets</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>fgetss</Name> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>getenv</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>file</Name> - <RaceUse>1</RaceUse> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>fscanf</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>gzfile</Name> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>gzgetc</Name> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>gzgets</Name> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>gzread</Name> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>gzgetss</Name> - <Input/> - </Vulnerability> - - - <Vulnerability> - <Name>read</Name> - <Input/> - </Vulnerability> - - - - <Vulnerability> - <Name>gzopen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - <RaceUse>1</RaceUse> - </Vulnerability> - - - - - <Vulnerability> - <Name>eval</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - <Vulnerability> - <Name>highlight_file</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - - <Vulnerability> - <Name>show_source</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - <Vulnerability> - <Name>leak</Name> - <Info> - <Severity>Medium</Severity> - <Description>This function literally leaks memory. Are you sure you meant to use this?</Description> - </Info> - </Vulnerability> - - - - <Vulnerability> - <Name>chroot</Name> - <Info> - <Severity>Low</Severity> - <Description>Reminder: Do not forget to chdir() to an appropriate directory before calling chroot()</Description> - </Info> - </Vulnerability> - - - <Vulnerability> - <Name>fsockopen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>Medium</Severity> - </InputProblem> - </Vulnerability> - - <Vulnerability> - <Name>pfsockopen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>Medium</Severity> - </InputProblem> - </Vulnerability> - - <Vulnerability> - <Name>posix_getlogin</Name> - <Info> - <Description> The results of this call are easy to forge.</Description> - <Severity>Medium</Severity> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>posix_ttyname</Name> - <Info> - <Description> - The results are easy for an attacker to forge, and not reliable. - </Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>system</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - - <Vulnerability> - <Name>passthru</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - - <Vulnerability> - <Name>fopen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>bzopen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - <RaceUse>1</RaceUse> - </Vulnerability> - - - <Vulnerability> - <Name>popen</Name> - <InputProblem> - <Arg>1</Arg> - <Severity>High</Severity> - </InputProblem> - </Vulnerability> - - - - <Vulnerability> - <Name>posix_mkfifo</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>opendir</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>exec</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - - <Vulnerability> - <Name>basename</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>chmod</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>chown</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>dirname</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>link</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>mkdir</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>readfile</Name> - <RaceUse>1</RaceUse> - <Input/> - </Vulnerability> - - <Vulnerability> - <Name>rename</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>rmdir</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>symlink</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>unlink</Name> - <RaceUse>1</RaceUse> - </Vulnerability> - - <Vulnerability> - <Name>filegroup</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>fileowner</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>fileperms</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_dir</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_executable</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_file</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_link</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_readable</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_writable</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>is_writeable</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>stat</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>lstat</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - - - - - - - - -</VulnDB> - - - -