Page 11 of 173 results (0.012 seconds)

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 1

10 Sep 2016 — ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection. ext/session/session.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 omite nombres de sesión no válidos de una manera que desencadena un análisis gramatical incorrecto, lo que permite a atacantes rem... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 9%CPEs: 11EXPL: 1

10 Sep 2016 — The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument. La función imagetruecolortopalette en ext/gd/gd.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 no valida adecuadamente el número de col... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 3%CPEs: 11EXPL: 1

10 Sep 2016 — The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments. La función imagetruecolortopalette en ext/gd/gd.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 no valida adecuadamente los valores de gama, lo que permite a ata... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 1%CPEs: 11EXPL: 1

10 Sep 2016 — The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image. La función exif_process_IFD_in_TIFF en ext/exif/exif.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 no maneja correctamente el caso de desplazamientos en miniatura que exceden el tamaño de archivo, lo... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 3%CPEs: 11EXPL: 1

10 Sep 2016 — The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document. La función php_wddx_process_data en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remo... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 1

10 Sep 2016 — The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document. La función php_wddx_pop_element en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 ... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 13%CPEs: 11EXPL: 1

10 Sep 2016 — ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character. ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remotos provocar una denegación de servicio ... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 13%CPEs: 11EXPL: 1

10 Sep 2016 — ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing. ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.25 y 7.x en versiones anteriores a 7.0.10 permite a atacantes remotos pr... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-476: NULL Pointer Dereference •

CVSS: 8.1EPSS: 0%CPEs: 10EXPL: 1

10 Sep 2016 — Zend/zend_alloc.c in PHP 7.x before 7.0.10, when open_basedir is enabled, mishandles huge realloc operations, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a long pathname. Zend/zend_alloc.c en PHP 7.x en versiones anteriores a 7.0.10, cuando la apertura de open_basedir está habilitada, no maneja adecuadamente operaciones de realloc enormes, lo que permite a atacantes remotos provocar una denegación de servicio (desbordamiento de ... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

10 Sep 2016 — ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call. ext/curl/interface.c en PHP 7.x en versiones anteriores a 7.0.10 no evita un desbordamiento de entero en libcurl, lo que permite a atacantes remotos provocar una denegación de servicio (error de localizació... • http://openwall.com/lists/oss-security/2016/09/02/9 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •