Page 105 of 537 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.osvdb.org/2111 http://www.redhat.com/support • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 5.0EPSS: 1%CPEs: 36EXPL: 1

move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. • https://www.exploit-db.com/exploits/21347 http://bugs.php.net/bug.php?id=16128 http://marc.info/?l=bugtraq&m=101683938806677&w=2 http://online.securityfocus.com/archive/1/262999 http://online.securityfocus.com/archive/1/263259 http://www.iss.net/security_center/static/8591.php http://www.securityfocus.com/bid/4325 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed. • http://marc.info/?l=bugtraq&m=102734515923277&w=2 http://marc.info/?l=bugtraq&m=102734516023281&w=2 http://www.cert.org/advisories/CA-2002-21.html http://www.iss.net/security_center/static/9635.php http://www.kb.cert.org/vuls/id/929115 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path. PHP, cuando no está configurado con la opción ""display_errors = Off"" en el fichero php.ini, permite que atacantes remotos obtengan el path absoluto para un fichero include por medio de un caracter / en una petición a un programa PHP directamente accesible, lo cual modifica el path de base, obliga a que la directiva include falle, y produce un mensaje de error que contiene el path. • http://marc.info/?l=bugtraq&m=101318944130790&w=2 http://www.iss.net/security_center/static/8122.php http://www.securityfocus.com/bid/4063 •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 3

Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements. La característica de Modo Seguro (safe_mode) de PHP 3.0 a 4.1.0 permite a atacantes con acceso a la base de datos MySQL evadir las restricciones del Modo Seguro y leer ficheros arbitrarios usando sentencias SQL "LOAD DATA INFILE LOCAL". • https://www.exploit-db.com/exploits/21264 https://www.exploit-db.com/exploits/21266 https://www.exploit-db.com/exploits/21265 http://marc.info/?l=bugtraq&m=101286577109716&w=2 http://marc.info/?l=bugtraq&m=101304702002321&w=2 http://marc.info/?l=ntbugtraq&m=101285016125377&w=2 http://marc.info/?l=ntbugtraq&m=101303065423534&w=2 http://marc.info/? •