Page 2 of 14 results (0.007 seconds)

CVSS: 10.0EPSS: 1%CPEs: 11EXPL: 0

Argument injection vulnerability in the ping function in Ping.php in the Net_Ping package before 2.4.5 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: this has also been reported as a shell metacharacter problem. La vulnerabilidad de inyección de argumentos en la función ping en el archivo Ping.php en el paquete Net_Ping anterior a versión 2.4.5 para PEAR, permite a los atacantes remotos ejecutar comandos de shell arbitrarios por medio del parámetro host. NOTA: esto también se ha notificado como un problema del metacarácter de shell. • http://blog.pear.php.net/2009/11/14/net_traceroute-and-net_ping-security-advisory http://pear.php.net/advisory20091114-01.txt http://pear.php.net/package/Net_Ping/download/2.4.5 http://secunia.com/advisories/37451 http://secunia.com/advisories/37502 http://svn.php.net/viewvc/pear/packages/Net_Ping/trunk/Ping.php?r1=274728&r2=290669&pathrev=290669 http://www.debian.org/security/2009/dsa-1949 http://www.securityfocus.com/bid/37093 http://www.vupen.com/english/ad • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

Argument injection vulnerability in the traceroute function in Traceroute.php in the Net_Traceroute package before 0.21.2 for PEAR allows remote attackers to execute arbitrary shell commands via the host parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección de argumento en la función traceroute en el paquete Net_Traceroute anterior a v0.21.2 para PEAR, permite a atacantes remotos ejecutar comandos de su elección a través del parámetro host. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://blog.pear.php.net/2009/11/14/net_traceroute-and-net_ping-security-advisory http://osvdb.org/60515 http://pear.php.net/advisory20091114-01.txt http://pear.php.net/package/Net_Traceroute/download/0.21.2 http://secunia.com/advisories/37497 http://secunia.com/advisories/37503 http://security.gentoo.org/glsa/glsa-200911-06.xml http://www.openwall.com/lists/oss-security/2009/11/23/8 http://www.securityfocus.com/bid/37094 http://www.vupen.com/english/advisor • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

The LOB functionality in PEAR MDB2 before 2.5.0a1 interprets a request to store a URL string as a request to retrieve and store the contents of the URL, which might allow remote attackers to use MDB2 as an indirect proxy or obtain sensitive information via a URL into a form field in an MDB2 application, as demonstrated by a file:// URL or a URL for an intranet web site. La funcionalidad LOB en PEAR MDB2 anterior a 2.5.0a1 interpreta una respuesta para almacenar una cadena que contiene una URL, lo cual podría permitir a atacantes remotos utilziar MDB2 como un proxy indirecto o obtener información sensible a través de una URL dentro del campo form en una aplicaicón MDB2, como se demostró por file:// URL o una URL para un sitio web intranet. • http://bugs.gentoo.org/show_bug.cgi?id=198446 http://marc.info/?l=pear-cvs&m=117823082829114&w=2 http://osvdb.org/42107 http://pear.php.net/bugs/bug.php?id=10024 http://pear.php.net/package/MDB2/download/2.5.0a1 http://secunia.com/advisories/27572 http://secunia.com/advisories/27626 http://secunia.com/advisories/27983 http://security.gentoo.org/glsa/glsa-200712-05.xml http://www.securityfocus.com/bid/26382 http://www.vupen.com/english/advisories/20 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the fetch function in MDB2.php in PEAR Structures-DataGrid-DataSource-MDB2 0.1.9 and earlier allows attackers to "manipulate the generated sorting queries." Vulnerabilidad no especificada en la función fetch en MDB2.php en PEAR Structures-DataGrid-DataSource-MDB2 0.1.9 y anteriores permite a atacantes remotos "manipular la ordenación generada de preguntas". • http://osvdb.org/45805 http://pear.php.net/package/Structures_DataGrid_DataSource_MDB2/download/0.1.10 http://www.vupen.com/english/advisories/2007/2425 •

CVSS: 5.0EPSS: 8%CPEs: 3EXPL: 0

Directory traversal vulnerability in PEAR::Archive_Tar 1.2, and other versions before 1.3.2, allows remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a TAR archive. • http://pear.php.net/bugs/bug.php?id=6933 http://pear.php.net/package/Archive_Tar/download http://secunia.com/advisories/19011 http://www.hamid.ir/security/phptar.txt http://www.osvdb.org/23481 http://www.securityfocus.com/archive/1/425967/100/0/threaded http://www.securityfocus.com/bid/16805 http://www.vupen.com/english/advisories/2006/0728 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •