Page 106 of 538 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path. PHP, cuando no está configurado con la opción ""display_errors = Off"" en el fichero php.ini, permite que atacantes remotos obtengan el path absoluto para un fichero include por medio de un caracter / en una petición a un programa PHP directamente accesible, lo cual modifica el path de base, obliga a que la directiva include falle, y produce un mensaje de error que contiene el path. • http://marc.info/?l=bugtraq&m=101318944130790&w=2 http://www.iss.net/security_center/static/8122.php http://www.securityfocus.com/bid/4063 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

PHP 4.0 through 4.1.1 stores session IDs in temporary files whose name contains the session ID, which allows local users to hijack web connections. PHP 4.0 a 4.1.1 almacena IDs en archivos temporales cuyo nombre contiene la sesión ID, que permite a usuarios locales secuestrar conexiones de web. • http://online.securityfocus.com/archive/1/250196 http://www.iss.net/security_center/static/7908.php http://www.securityfocus.com/bid/3873 •

CVSS: 7.5EPSS: 93%CPEs: 4EXPL: 0

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. Desbordamiento de buffer en:(1) PHP 4.1.0, 4.1.1 y 4.0.6 y anteriores y (2) php3_mime_split en PHP 3.0.x permite que atacantes remotos ejecuten código arbitrario a través de una petición de datos de formulario HTTP, vía POST, cuando "file_uploads" está activado. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468 http://marc.info/?l=bugtraq&m=101484705523351&w=2 http://marc.info/?l=bugtraq&m=101497256024338&w=2 http://marc.info/?l=bugtraq&m=101537076619812&w=2 http://marc.info/? •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 1

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files. • http://online.securityfocus.com/archive/1/194425 http://www.osvdb.org/5440 http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz http://www.redhat.com/support/errata/RHSA-2002-035.html https://access.redhat.com/security/cve/CVE-2001-1247 https://bugzilla.redhat.com/show_bug.cgi?id=1616655 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 1

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/20985 http://online.securityfocus.com/archive/1/194425 http://www.iss.net/security_center/static/6787.php http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz http://www.redhat.com/support/errata/RHSA-2002-102.html http://www.redhat.com/support/errata/RHSA-2002-129.html http://www.redhat.com/support/errata/RHSA-2003-159.html http://www.securityfocus.com/bid/2954 https://access.redhat.com/security/cve/CVE-2001&# • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •