Page 36 of 417 results (0.022 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 1

27 Mar 2007 — PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:". PHP 4 anterior a 4.4.5, y PHP 5 anterior a 5.2.1, cuando register_globals está activado, permiten a atacantes locales o remotos dependiendo del contexto ejecutar código de su elección mediante una deseria... • https://www.exploit-db.com/exploits/3572 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 1%CPEs: 33EXPL: 4

21 Mar 2007 — The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources. NOTE: it was later reported that PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 are also affected. El sistema de recursos de PHP versión 5.0.0 hasta 5.2.1 permite a los atacantes dependiendo del contexto ejecutar código arbitrario mediante la int... • https://www.exploit-db.com/exploits/3529 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 75EXPL: 1

21 Mar 2007 — The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error handler, which can be used to destroy and modify internal resources. El sistema de recursos en PHP 4.0.0 hasta 4.4.6 y 5.0.0 hasta 5.2.1 permite a atacante dependientes del contexto ejecutar código de su elección mediante interrupciones en ciertas funciones de l... • https://www.exploit-db.com/exploits/3525 •

CVSS: 9.1EPSS: 74%CPEs: 75EXPL: 1

21 Mar 2007 — The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation. La función mb_parse_str del PHP 4.0.0 hasta la 4.4.6 y de la 5.0.0 hasta la 5.2.1 establece la bandera interna del registro global y no ... • https://www.exploit-db.com/exploits/29752 •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 2

20 Mar 2007 — Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation. Una vulnerabilidad de doble liberación en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, permite a atacantes dependiendo del contexto ejecutar código arbitrario mediante la interrupción de la función session_regene... • https://www.exploit-db.com/exploits/3479 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

16 Mar 2007 — The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called. La función array_user_key_compare en PHP 4.4.6 y anteriores, y 5.X hasta la 5.2.1, hace una llamada erronea a zval_dtor, lo cual dispara una corrupción de memoria y permite a usuarios locales evitar el safe_mode y ... • https://www.exploit-db.com/exploits/3499 •

CVSS: 7.5EPSS: 1%CPEs: 63EXPL: 0

14 Mar 2007 — The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories. La URL encapsulada zip:// proporcionada por la extensión zip PECL en PHP versiones anteriores a 4.4.7, y versiones 5.2.0 y 5.2.1, no implementa comprobaciones de safemode o open_basedir, lo que permite a atacantes remotos leer archivos ZIP ubicados fuera de los di... • http://docs.info.apple.com/article.html?artnum=306172 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 1%CPEs: 76EXPL: 0

14 Mar 2007 — The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories. La URL encapsulada compress.bzip2:// proporcionada por la extensión bz2 en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, no implementa comprobaciones de safemode o open_basedir, lo que permite a atacantes remotos leer archivos bzip... • http://docs.info.apple.com/article.html?artnum=306172 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 1%CPEs: 17EXPL: 1

14 Mar 2007 — The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement the input filtering hooks for ext/filter, which allows remote attackers to bypass web site filters via an application/vnd.fdf formatted POST. El soporte FDF (ext/fdf) del PHP 5.2.0 y versiones anteriores no implementa enlaces para el filtrado de la entrada para el ext/filter, lo que permite a atacantes remotos evitar los filtros del sitio web mediante un POST application/vnd.fdf formateado. • https://www.exploit-db.com/exploits/3452 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 4

12 Mar 2007 — Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id). Un desbordamiento de búfer en la función snmpget en la extensión snmp en PHP versión 5.2.3 y anteriores, incluyendo a PHP versión 4.4.6 y probablemente otras versiones 4 de PHP, permite a atacantes dependiendo del contexto ejecutar código arbitrario por me... • https://www.exploit-db.com/exploits/3439 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •