Page 41 of 537 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

27 Mar 2007 — Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string. Desbordamiento de búfer en la función confirm_phpdoc_compiled de la extensión phpDOC (PECL phpDOC) de PHP 5.2.1 permite a atacantes locales o remotos dependiendo del contexto ejecutar código de su elección mediante una cadena larga como argumento. • https://www.exploit-db.com/exploits/3576 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

27 Mar 2007 — The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence. La función readfile de PHP 4.4.4, 5.1.6, Y 5.2.1 permite a usuarios locales o remotos dependiendo del contexto evitar las restricciones del modo seguro (safe_mode) y leer archivos de su elección haciendo referencia a... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 •

CVSS: 9.8EPSS: 11%CPEs: 2EXPL: 1

27 Mar 2007 — Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION. NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007). Una vulnerabilidad de doble liberación (Double Free) en la deserialización en PHP versiones 4.4.5 y 4.4.6 permite a los atacantes dependiendo del contexto ejecutar código arbitrario mediante la sobre... • https://www.exploit-db.com/exploits/3586 •

CVSS: 7.8EPSS: 6%CPEs: 1EXPL: 2

24 Mar 2007 — PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed. PHP 5.2.1 permite a atacantes depedientes del contexto leer porciones de la cabecera de memoria a través de la ejecución de ciertos scripts con datos de entrada serializados que comienzan con S:, lo cual no sigue adecuadamente el número de entradas de bytes que han sido procesa... • https://www.exploit-db.com/exploits/3559 •

CVSS: 9.8EPSS: 7%CPEs: 33EXPL: 4

21 Mar 2007 — The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources. NOTE: it was later reported that PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 are also affected. El sistema de recursos de PHP versión 5.0.0 hasta 5.2.1 permite a los atacantes dependiendo del contexto ejecutar código arbitrario mediante la int... • https://www.exploit-db.com/exploits/3529 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 2%CPEs: 75EXPL: 1

21 Mar 2007 — The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error handler, which can be used to destroy and modify internal resources. El sistema de recursos en PHP 4.0.0 hasta 4.4.6 y 5.0.0 hasta 5.2.1 permite a atacante dependientes del contexto ejecutar código de su elección mediante interrupciones en ciertas funciones de l... • https://www.exploit-db.com/exploits/3525 •

CVSS: 9.1EPSS: 14%CPEs: 75EXPL: 1

21 Mar 2007 — The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation. La función mb_parse_str del PHP 4.0.0 hasta la 4.4.6 y de la 5.0.0 hasta la 5.2.1 establece la bandera interna del registro global y no ... • https://www.exploit-db.com/exploits/29752 •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 2

21 Mar 2007 — Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string. Desbordamiento de búfer en la función header en PHP 5.2.0 permite a atacantes dependientes de contexto ejecutar código de su elección pasando una cadena rellena con espacios en blanco, lo cual provoca que escriba caracteres '\0' en espacios en blanco que preceden... • https://www.exploit-db.com/exploits/3517 •

CVSS: 9.8EPSS: 14%CPEs: 1EXPL: 2

20 Mar 2007 — Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation. Una vulnerabilidad de doble liberación en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, permite a atacantes dependiendo del contexto ejecutar código arbitrario mediante la interrupción de la función session_regene... • https://www.exploit-db.com/exploits/3479 •

CVSS: 9.8EPSS: 5%CPEs: 2EXPL: 2

20 Mar 2007 — Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors. Vulnerabilidad de liberación doble en la extensión session... • https://www.exploit-db.com/exploits/3480 •