
CVE-2007-0906
https://notcve.org/view.php?id=CVE-2007-0906
13 Feb 2007 — Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1... • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-0907
https://notcve.org/view.php?id=CVE-2007-0907
13 Feb 2007 — Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function. Desbordamiento de búfer por debajo en PHP anterior a 5.2.1 permite a atacantes provocar una denegación de servicio mediante vectores no especificados involucrando a la función sapi_header_op. • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc •

CVE-2007-0908 – PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak
https://notcve.org/view.php?id=CVE-2007-0908
13 Feb 2007 — The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable. El deserializador WDDX en la extensión wddx en PHP versión 5 anterior a 5.2.1 y PHP versión 4 anterior a 4.4.5, no inicializa apropiadamente la variable key_length para una clave numérica, ... • https://www.exploit-db.com/exploits/3414 • CWE-20: Improper Input Validation •

CVE-2007-0909
https://notcve.org/view.php?id=CVE-2007-0909
13 Feb 2007 — Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function. Múltiples vulnerabilidades de cadena de formato en PHP anterior a 5.2.1 podría permitir a atacantes remotos ejecutar código de su elección mediante especificadores de cadena de formato a (1) todas las funciones *print en sistemas de 64 bits, y a (2) la función odbc_result_all. • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc •

CVE-2007-0910
https://notcve.org/view.php?id=CVE-2007-0910
13 Feb 2007 — Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors. La vulnerabilidad no especificada en PHP versión anterior a 5.2.1 permite a los atacantes "golpear" (clobber) ciertas variables super-globales por medio de vectores no especificados • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc •

CVE-2007-0911 – PHP 5.2.1 - STR_IReplace Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-0911
13 Feb 2007 — Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash). Error de fuera de rango por uno (Off-by-one) en la función str_ireplace en PHP 5.2.1 podría permitir a atacantes dependientes del contexto provocar una denegación de servicio (caída). • https://www.exploit-db.com/exploits/29577 •

CVE-2006-6383 – PHP 5.2 - Session.Save_Path() 'Safe_mode' / 'open_basedir' Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-6383
10 Dec 2006 — PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path. PHP 5.2.0 y 4.4 permite a usuarios locales evitar restricciones safe_mode y open_basedir a través de una ruta maliciosa y un byte nulo anterior a ";" en el argumento session_save_path, s... • https://www.exploit-db.com/exploits/29239 • CWE-20: Improper Input Validation •

CVE-2006-3017
https://notcve.org/view.php?id=CVE-2006-3017
14 Jun 2006 — zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations. • ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U •