Page 106 of 532 results (0.008 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000373 http://marc.info/?l=bugtraq&m=97957961212852 http://www.debian.org/security/2001/dsa-020 http://www.iss.net/security_center/static/5939.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-013.php3 http://www.redhat.com/support/errata/RHSA-2000-136.html http://www.securityfocus.com/bid/2205 •

CVSS: 10.0EPSS: 34%CPEs: 2EXPL: 3

PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs. • https://www.exploit-db.com/exploits/220 https://www.exploit-db.com/exploits/20286 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:75.php.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0204.html http://www.atstake.com/research/advisories/2000/a101200-1.txt http://www.calderasystems.com/support/security/advisories/CSSA-2000-037.0.txt http://www.linux-mandrake.com/en/security/MDKSA-2000-062.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA •

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 1

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0477.html http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u http://www.securityfocus.com/bid/1649 https://exchange.xforce.ibmcloud.com/vulnerabilities/5190 •

CVSS: 10.0EPSS: 6%CPEs: 14EXPL: 1

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands. • https://www.exploit-db.com/exploits/19708 http://www.securityfocus.com/bid/911 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 1

CGI PHP mylog script allows an attacker to read any file on the target server. • https://www.exploit-db.com/exploits/19553 http://www.osvdb.org/3396 http://www.securityfocus.com/bid/713 •