Page 108 of 589 results (0.015 seconds)

CVSS: 4.3EPSS: 77%CPEs: 48EXPL: 1

Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a "stacked array assignment." • https://www.exploit-db.com/exploits/26442 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/17371 http://secunia.com/advisories/17490 http://secunia.com/advisories/17510 http://secunia.com/advisories/17531 http://secunia.com/advisories/17557 http://secunia.com/advisories/17559 http://secunia.com/advisories/18198 http://secunia.com/advisories/18669 http://secunia.com/advisories/21252 •

CVSS: 2.1EPSS: 0%CPEs: 44EXPL: 0

The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0491.html http://bugs.gentoo.org/show_bug.cgi?id=107602 http://docs.info.apple.com/article.html?artnum=303382 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://marc.info/?l=bugtraq&m=113019286208204&w=2 http://secunia.com/advisories/17510 http://secunia.com/advisories/17557 http://secunia.com/advisories/18198 http://secunia& •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

fopen_wrappers.c in PHP 4.4.0, and possibly other versions, does not properly restrict access to other directories when the open_basedir directive includes a trailing slash, which allows PHP scripts in one directory to access files in other directories whose names are substrings of the original directory. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323585 http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html http://secunia.com/advisories/17229 http://secunia.com/advisories/17371 http://secunia.com/advisories/17510 http://secunia.com/advisories/17557 http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:213 http://www.php.net/release_4_4_1.php http://www.securityfocus.com/bid/14957 •

CVSS: 7.5EPSS: 10%CPEs: 11EXPL: 0

Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count. • http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.33&r2=1.118.2.34&ty=u http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/support/errata/RHSA-2005-406.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154021 https: •

CVSS: 5.0EPSS: 1%CPEs: 71EXPL: 0

exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion. • http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.29&r2=1.118.2.30&ty=u http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.redhat.com/support/errata/RHSA-2005-406.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.m •