Page 28 of 619 results (0.018 seconds)

CVSS: 8.8EPSS: 5%CPEs: 144EXPL: 0

11 Jun 2013 — Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function. Desbordamiento de búfer basado en memoria dinámica en la función php_quot_print_encode en ext/standard/quot_print.c en PHP anterior a v5.3.26 y v5.4.x anterior a v5.4.16 permite a atacantes remo... • http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 31EXPL: 1

31 May 2013 — The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers eac... • https://bugs.php.net/bug.php?id=64660 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 137EXPL: 0

06 Mar 2013 — The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824. El parser SOAP en PHP v5.3.22 y v5.4.x anterior a v5.4.13 permite a atacantes remotos leer archivos de su elec... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.1EPSS: 1%CPEs: 137EXPL: 0

06 Mar 2013 — ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory. ext/soap/soap.c en PHP anterior a v5.3.22 y v5.4.x anterior a v5.4.13 no valida la relacion entre la directiva soap.wsdl_cache_dir y la directiva open_basedir, lo que permite a atacantes remoto... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

19 Jan 2013 — The openssl_encrypt function in ext/openssl/openssl.c in PHP 5.3.9 through 5.3.13 does not initialize a certain variable, which allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data. La función openssl_encrypt en ext/openssl/openssl.c en PHP v5.3.9 hasta v5.3.13 no inicia una cierta variable, que permite ataques para obtener información de procesos en memoria proporcionando cero bytes de entrada. • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=270a406ac94b5fc5cc9ef59fc61e3b4b95648a3e • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 2

11 Oct 2012 — Untrusted search path vulnerability in the installation functionality in PHP 5.3.17, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\PHP directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.... • https://www.exploit-db.com/exploits/28130 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 1

07 Sep 2012 — The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398. La func... • http://article.gmane.org/gmane.comp.php.devel/70584 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 11EXPL: 1

30 Aug 2012 — The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. La función sapi_header_op en el archivo main/SAPI.c en PHP anterior a versión 5.3.11 y versiones 5.4.x ant... • https://www.exploit-db.com/exploits/37688 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 6%CPEs: 18EXPL: 1

06 Aug 2012 — pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value. pdo_sql_parser.re en la extensión PDO en PHP anteriores a v5.3.14 y v5.4.x anterior a v5.4.4 no determina de forma adecuada el final de la cadena en la petición durante un análisis sintáctico de estruc... • https://www.exploit-db.com/exploits/37566 •

CVSS: 7.3EPSS: 0%CPEs: 117EXPL: 0

20 Jul 2012 — The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors. La funcionalidad de SQLite en PHP antes de v5.3.15 permite a atacantes remotos eludir el mecanismo de protección open_basedir a través de vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html • CWE-264: Permissions, Privileges, and Access Controls •