Page 48 of 565 results (0.005 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 3

10 Dec 2006 — PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path. PHP 5.2.0 y 4.4 permite a usuarios locales evitar restricciones safe_mode y open_basedir a través de una ruta maliciosa y un byte nulo anterior a ";" en el argumento session_save_path, s... • https://www.exploit-db.com/exploits/29239 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

04 Nov 2006 — Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494. Vulnerabilidades no especificada en PHP, probablemente anterior a 5.2.0, permite a un usuario local evitar las restricciones open_basedir y llevar a cabo acciones no específicas a través de vectores no especificados que afectan a (1)chdir... • http://www.php.net/releases/5_2_0.php •

CVSS: 9.8EPSS: 44%CPEs: 16EXPL: 0

04 Nov 2006 — Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions. Desbordamiento de búfer en PHP anterior a 5.2.0 permite a un atacante remoto ejecutar código de su elección mediante entradas UTF-8 manipuladas a las funciones (1) htmlentities o (2) htmlspecialchars. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P •

CVSS: 10.0EPSS: 27%CPEs: 38EXPL: 1

09 Oct 2006 — Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c). Desbordamiento de enteros en PHP 5 hasta la 5.1.6 y 4 anteriorer a 4.3.0 permite a un atacante remoto ejecutar código de su elección a través de un argumento a la funcion PHP unserializable con un valor grande para el n... • https://www.exploit-db.com/exploits/28760 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.2EPSS: 0%CPEs: 54EXPL: 6

06 Oct 2006 — Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink. Condición de carrera en la función symlink en PHP 5.1.6 ... • https://www.exploit-db.com/exploits/10557 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 3.6EPSS: 0%CPEs: 54EXPL: 3

12 Sep 2006 — PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults. PHP 4.x up a 4.4.4 y PHP 5 up a 5.1.6, permite a un usuario local evitar las opciones httpd.conf del Apache HTTP Server, al igual que safe_mode y open_basedir, a través de la función ini_restore, lo cual restaura los valores de su php.ini (valor Master) por defe... • https://www.exploit-db.com/exploits/28504 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

31 Aug 2006 — The (1) file_exists and (2) imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CVE-2006-1017. Las funciones (1) file_exists y (2) imap_reopen en PHP before 5.1.5 no validan para las configuraciones safe_mode y open_basedir, lo cual permite a un usuario local evitar las configuraciones. NOTA: la función error_log e... • http://secunia.com/advisories/21546 •

CVSS: 9.8EPSS: 3%CPEs: 5EXPL: 0

31 Aug 2006 — Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990. Múltiples vulnerabilidades de desbordamiento de búfer en las funciones (1) str_repeat y (2) wordwrap en ext/standard/string.c en PHP anterior a 5.1.5, cuando se uso sobre sistemas de 64-bit, tiene un impacto desconocido y ataque a vectores, una vulnerabilidad ... • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

31 Aug 2006 — The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache. Los ficheros con extensión cURL (1) ext/curl/interface.c y(2) ext/curl/streams.c en PHP anterior a 5.1.5 permite la opción CURLOPT_FOLLOWLOCATION cuando open_basedir o safe_mode está habilitado, lo cual permite a un atacante realizar a... • http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 3%CPEs: 4EXPL: 1

31 Aug 2006 — Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array. Desbordamiento de búfer en la función LWZReadByte_ en ext/gd/libgd/gd_gif_in.c en la extensión GD en PHP anterior a 5.1.5 permite a atacantes remotos tener un impacto desconocido mediante un fichero GIF con input_code_size m... • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc •