Page 42 of 569 results (0.013 seconds)

CVSS: 9.8EPSS: 1%CPEs: 59EXPL: 0

09 May 2007 — CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands. Vulnerabilidad de inyección de retornos de carro y saltos de línea en la función ftp_putcmd de PHP versiones anteriores a 4.4.7, y 5.x anteriores a 5.2.2 permite a atacantes remotos inyectar comandos FTP de su elección mediante secuencias de retornos de carro y saltos de línea en los parámetros... • http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 45EXPL: 0

09 May 2007 — Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors. Desbordamiento de búfer en la función user_filter_factory_create de PHP anterior a 5.2.2 tiene impacto y vectores de ataque locales desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html •

CVSS: 9.8EPSS: 1%CPEs: 10EXPL: 0

09 May 2007 — Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors. Desbordamiento de búfer en la librería libxmlrpc incluida en PHP anterior a 4.4.7, y 5.x anterior a 5.2.2, tiene impacto y vectores de ataque remotos desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

30 Apr 2007 — Directory traversal vulnerability in picture.php in WebSPELL 4.01.02 and earlier, when PHP before 4.3.0 is used, allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter. Vulnerabilidad de salto de directorio en picture.php de WebSPELL 4.01.02 y anteriores, cuando se está utilizando PHP anterior a 4.3.0, permite a atacantes remotos leer ficheros de su elección mediante secuencias .. (punto punto) en el parámetro id. • https://www.exploit-db.com/exploits/3673 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

10 Apr 2007 — CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string. Vulnerabilidad de inyección CRLF (retorno de carro y nueva línea) en el filtro FILTER_VALIDATE_EMAIL en ext/filter de PHP 5.2.0 y 5.2.1 permite a atacantes locales o remotos dependiendo del contexto inyectar ... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 •

CVSS: 9.8EPSS: 2%CPEs: 6EXPL: 0

06 Apr 2007 — Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character. Desbordamiento de búfer en la función sqlite_decode_binary dentro de lo que es la libreria en PHP 4 anterior a 4.4.5 y PHP 5 anterior a 5.2.1 permite a atacantes dependientes del contexto ejecuta... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 64EXPL: 2

06 Apr 2007 — Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff. Desbordamiento de búfer en la función msg_receive en PHP 4 anterior a 4.4.5 y PHP 5 anterior a 5.2.1, sobre FreeBSD y posiblemente otras plataformas, permite a atacantes dependientes del contexto ejecutar código de su elección a través de ciertos valores maxsi... • https://www.exploit-db.com/exploits/29808 •

CVSS: 9.8EPSS: 2%CPEs: 77EXPL: 0

06 Apr 2007 — Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary ... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 •

CVSS: 9.8EPSS: 1%CPEs: 76EXPL: 0

06 Apr 2007 — Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API. Un desbordamiento de búfer en la función sqlite_decode_binary en el archivo s... • http://osvdb.org/39177 •

CVSS: 9.8EPSS: 24%CPEs: 1EXPL: 0

06 Apr 2007 — Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize. Error de signo de entero en la función _zend_mm_alloc_int en Zend Memory Manager de PHP 5.2.0 permite a atacantes remotos ejecutar código de su elección mediant... • http://secunia.com/advisories/25056 •