
CVE-2004-0542
https://notcve.org/view.php?id=CVE-2004-0542
10 Jun 2004 — PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function. PHP anteriores a 4.3.7 en plataformas Win32 no filtra adecuadamente todos los metacaractéres de shell, lo que permite a atacantes locales o remotos ejecutar código de su e... • http://www.idefense.com/application/poi/display?id=108 •

CVE-2003-1303
https://notcve.org/view.php?id=CVE-2003-1303
31 Dec 2003 — Buffer overflow in the imap_fetch_overview function in the IMAP functionality (php_imap.c) in PHP before 4.3.3 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long e-mail address in a (1) To or (2) From header. • http://bugs.php.net/bug.php?id=24150 •

CVE-2003-1302
https://notcve.org/view.php?id=CVE-2003-1302
31 Dec 2003 — The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters. • http://bugs.php.net/bug.php?id=22048 •

CVE-2003-0860
https://notcve.org/view.php?id=CVE-2003-0860
15 Oct 2003 — Buffer overflows in PHP before 4.3.3 have unknown impact and unknown attack vectors. Desbordamiento de búfer en PHP anteriores a 4.3.3 tienen impacto desconocido y vectores de ataque desconocidos. • http://www.php.net/ChangeLog-4.php#4.3.3 •

CVE-2003-0861
https://notcve.org/view.php?id=CVE-2003-0861
15 Oct 2003 — Integer overflows in (1) base64_encode and (2) the GD library for PHP before 4.3.3 have unknown impact and unknown attack vectors. Desbordamientos de enteros en base64_encode y la librería GD de PHP anteriores a 4.3.3 tienen impactos y vectores de ataque desconocidos. • http://www.php.net/ChangeLog-4.php#4.3.3 •

CVE-2003-0863 – PHP 4.3.x - Undefined Safe_Mode_Include_Dir Safemode Bypass
https://notcve.org/view.php?id=CVE-2003-0863
15 Oct 2003 — The php_check_safe_mode_include_dir function in fopen_wrappers.c of PHP 4.3.x returns a success value (0) when the safe_mode_include_dir variable is not specified in configuration, which differs from the previous failure value and may allow remote attackers to exploit file include vulnerabilities in PHP applications. La función php_check_safe_module_include_dir en fopen_wrappers.c de PHP 4.3.x devuelve una valor de éxito (0) cuando la variable safe_mode_include_dir no está especificada en la configuración, ... • https://www.exploit-db.com/exploits/22911 •

CVE-2003-0442 – PHP 4.x - Transparent Session ID Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2003-0442
20 Jun 2003 — Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la capacidad de soporte transparente de SID en PHP anteriores a 4.3.2 (session.use_trans_sid) permite a atacantes remotos insertar script arbitrario mediante el parámetro PHPSESSID • https://www.exploit-db.com/exploits/22696 •

CVE-2003-0172 – PHP 4.3.7 - 'openlog()' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0172
29 Mar 2003 — Buffer overflow in openlog function for PHP 4.3.1 on Windows operating system, and possibly other OSes, allows remote attackers to cause a crash and possibly execute arbitrary code via a long filename argument. Desbordamiento de búfer en la función openlog de PHP 4.3.1 en Windows y posiblemente en otros Sistemas Operativos, permie a atacantes remotos causar la caída del sistema y posiblemente la ejecución de código arbitrario mediante un argumento nombre_de_fichero (filename) largo. • https://www.exploit-db.com/exploits/729 •

CVE-2003-0166 – PHP 4.x - 'socket_recv()' Signed Integer Memory Corruption
https://notcve.org/view.php?id=CVE-2003-0166
27 Mar 2003 — Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions. • https://www.exploit-db.com/exploits/22425 •

CVE-2003-0097
https://notcve.org/view.php?id=CVE-2003-0097
03 Mar 2003 — Unknown vulnerability in CGI module for PHP 4.3.0 allows attackers to access arbitrary files as the PHP user, and possibly execute PHP code, by bypassing the CGI force redirect settings (cgi.force_redirect or --enable-force-cgi-redirect). • http://marc.info/?l=bugtraq&m=104550977011668&w=2 •