Maxim Integrated's IoT development kit
Dependencies: MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice
Diff: tools/Rats-2.4/rats-php.xml
- Revision:
- 1:efe9cad8942f
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/tools/Rats-2.4/rats-php.xml Tue Mar 13 14:52:59 2018 +0300 @@ -0,0 +1,373 @@ +<VulnDB lang="php"> + + + + <Vulnerability> + <Name>mail</Name> + <Info> + <Severity>High</Severity> + <Description> + Arguments 1, 2, 4 and 5 of this function may be passed to an external + program. (Usually sendmail). Under Windows, they will be passed to a + remote email server. If these values are derived from user input, make + sure they are properly formatted and contain no unexpected characters or + extra data. + </Description> + </Info> + </Vulnerability> + + <Vulnerability> + <Name>getallheaders</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>bzread</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>fgets</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>fgetss</Name> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>getenv</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>file</Name> + <RaceUse>1</RaceUse> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>fscanf</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>gzfile</Name> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>gzgetc</Name> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>gzgets</Name> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>gzread</Name> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>gzgetss</Name> + <Input/> + </Vulnerability> + + + <Vulnerability> + <Name>read</Name> + <Input/> + </Vulnerability> + + + + <Vulnerability> + <Name>gzopen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + <RaceUse>1</RaceUse> + </Vulnerability> + + + + + <Vulnerability> + <Name>eval</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + <Vulnerability> + <Name>highlight_file</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + + <Vulnerability> + <Name>show_source</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + <Vulnerability> + <Name>leak</Name> + <Info> + <Severity>Medium</Severity> + <Description>This function literally leaks memory. Are you sure you meant to use this?</Description> + </Info> + </Vulnerability> + + + + <Vulnerability> + <Name>chroot</Name> + <Info> + <Severity>Low</Severity> + <Description>Reminder: Do not forget to chdir() to an appropriate directory before calling chroot()</Description> + </Info> + </Vulnerability> + + + <Vulnerability> + <Name>fsockopen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>Medium</Severity> + </InputProblem> + </Vulnerability> + + <Vulnerability> + <Name>pfsockopen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>Medium</Severity> + </InputProblem> + </Vulnerability> + + <Vulnerability> + <Name>posix_getlogin</Name> + <Info> + <Description> The results of this call are easy to forge.</Description> + <Severity>Medium</Severity> + </Info> + </Vulnerability> + + <Vulnerability> + <Name>posix_ttyname</Name> + <Info> + <Description> + The results are easy for an attacker to forge, and not reliable. + </Description> + </Info> + </Vulnerability> + + <Vulnerability> + <Name>system</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + + <Vulnerability> + <Name>passthru</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + + <Vulnerability> + <Name>fopen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>bzopen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + <RaceUse>1</RaceUse> + </Vulnerability> + + + <Vulnerability> + <Name>popen</Name> + <InputProblem> + <Arg>1</Arg> + <Severity>High</Severity> + </InputProblem> + </Vulnerability> + + + + <Vulnerability> + <Name>posix_mkfifo</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>opendir</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>exec</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + + <Vulnerability> + <Name>basename</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>chmod</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>chown</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>dirname</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>link</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>mkdir</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>readfile</Name> + <RaceUse>1</RaceUse> + <Input/> + </Vulnerability> + + <Vulnerability> + <Name>rename</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>rmdir</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>symlink</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>unlink</Name> + <RaceUse>1</RaceUse> + </Vulnerability> + + <Vulnerability> + <Name>filegroup</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>fileowner</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>fileperms</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_dir</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_executable</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_file</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_link</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_readable</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_writable</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>is_writeable</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>stat</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + <Vulnerability> + <Name>lstat</Name> + <RaceCheck>1</RaceCheck> + </Vulnerability> + + + + + + + + + +</VulnDB> + + + +