Page 100 of 560 results (0.008 seconds)

CVSS: 9.3EPSS: 13%CPEs: 78EXPL: 0

The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. • http://bugs.php.net/bug.php?id=37265 http://secunia.com/advisories/18694 http://secunia.com/advisories/21050 http://secunia.com/advisories/21546 http://securityreason.com/securityalert/516 http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 http://www.osvdb.org/23535 http://www.php.net/ChangeLog-5.php#5.1.5 http://www.php.net/release_5_1_5.php http://www.securityfocus.com/archive/1/426339/100/0/threaded http://www.vupen.com/english/advisories&# •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 0

Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html http://secunia.com/advisories/18431 http://secunia.com/advisories/18697 http://secunia.com/advisories/19012 http://secunia.com/advisories/19179 http://secunia.com/advisories/19355 http://secunia.com/advisories/25945 http://securitytracker.com/id?1015484 http://www.debian.org/security/2007/dsa-1331 http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml http://www.hardened-php.net/advisory_012006.1 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 2.6EPSS: 1%CPEs: 49EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html http://rhn.redhat.com/errata/RHSA-2006-0276.html http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/18431 http://secunia.com/advisories/18697 http://secunia.com/advisories/19012 http://secunia.com/advisories/19179 http://secunia.com/advisories/19355 http://secunia.com/advisories/19832 http://secunia& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 11%CPEs: 2EXPL: 0

Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages. • http://secunia.com/advisories/18431 http://securityreason.com/securityalert/337 http://securitytracker.com/id?1015485 http://www.hardened-php.net/advisory_022006.113.html http://www.php.net/release_5_1_2.php http://www.securityfocus.com/archive/1/421705/100/0/threaded http://www.securityfocus.com/bid/16219 http://www.vupen.com/english/advisories/2006/0177 http://www.vupen.com/english/advisories/2006/0369 https://exchange.xforce.ibmcloud.com/vulnerabilities/24095 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 3

Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. • https://www.exploit-db.com/exploits/1406 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0274.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041013.html http://secunia.com/advisories/18275 http://www.osvdb.org/22232 http://www.php.net/ChangeLog-4.php#4.4.3 http://www.securityfocus.com/archive/1/420986/100/0/threaded http://www.securityfocus.com/bid/16145 http://www.vupen.com/english/advisories/2006/0046 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •