
CVE-2002-2214
https://notcve.org/view.php?id=CVE-2002-2214
31 Dec 2002 — The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header. • http://bugs.php.net/bug.php?id=15595 •

CVE-2002-2215
https://notcve.org/view.php?id=CVE-2002-2215
31 Dec 2002 — The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. • http://bugs.php.net/bug.php?id=19280 •

CVE-2002-2309 – PHP Interpreter 3.0.x/4.0.x/4.1/4.2 - Direct Invocation Denial of Service
https://notcve.org/view.php?id=CVE-2002-2309
31 Dec 2002 — php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments. • https://www.exploit-db.com/exploits/21632 • CWE-399: Resource Management Errors •

CVE-2002-0985
https://notcve.org/view.php?id=CVE-2002-0985
24 Sep 2002 — Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2002-0986
https://notcve.org/view.php?id=CVE-2002-0986
24 Sep 2002 — The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy." • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt •

CVE-2002-0484 – PHP 3.0.x/4.x - Move_Uploaded_File open_basedir Circumvention
https://notcve.org/view.php?id=CVE-2002-0484
12 Aug 2002 — move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. • https://www.exploit-db.com/exploits/21347 •

CVE-2002-0717
https://notcve.org/view.php?id=CVE-2002-0717
23 Jul 2002 — PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed. • http://marc.info/?l=bugtraq&m=102734515923277&w=2 •

CVE-2002-0229 – PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention
https://notcve.org/view.php?id=CVE-2002-0229
03 May 2002 — Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements. La característica de Modo Seguro (safe_mode) de PHP 3.0 a 4.1.0 permite a atacantes con acceso a la base de datos MySQL evadir las restricciones del Modo Seguro y leer ficheros arbitrarios usando sentencias SQL "LOAD DATA INFILE LOCAL". • https://www.exploit-db.com/exploits/21264 •

CVE-2002-0253
https://notcve.org/view.php?id=CVE-2002-0253
03 May 2002 — PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path. PHP, cuando no está configurado con la opción ""display_errors = Off"" en el fichero php.ini, permite que atacantes remotos obtengan el path absoluto para un fichero inc... • http://marc.info/?l=bugtraq&m=101318944130790&w=2 •

CVE-2002-0121
https://notcve.org/view.php?id=CVE-2002-0121
25 Mar 2002 — PHP 4.0 through 4.1.1 stores session IDs in temporary files whose name contains the session ID, which allows local users to hijack web connections. PHP 4.0 a 4.1.1 almacena IDs en archivos temporales cuyo nombre contiene la sesión ID, que permite a usuarios locales secuestrar conexiones de web. • http://online.securityfocus.com/archive/1/250196 •