
CVE-2007-1900
https://notcve.org/view.php?id=CVE-2007-1900
10 Apr 2007 — CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string. Vulnerabilidad de inyección CRLF (retorno de carro y nueva línea) en el filtro FILTER_VALIDATE_EMAIL en ext/filter de PHP 5.2.0 y 5.2.1 permite a atacantes locales o remotos dependiendo del contexto inyectar ... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 •

CVE-2007-1887
https://notcve.org/view.php?id=CVE-2007-1887
06 Apr 2007 — Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character. Desbordamiento de búfer en la función sqlite_decode_binary dentro de lo que es la libreria en PHP 4 anterior a 4.4.5 y PHP 5 anterior a 5.2.1 permite a atacantes dependientes del contexto ejecuta... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2007-1890 – PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow
https://notcve.org/view.php?id=CVE-2007-1890
06 Apr 2007 — Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff. Desbordamiento de búfer en la función msg_receive en PHP 4 anterior a 4.4.5 y PHP 5 anterior a 5.2.1, sobre FreeBSD y posiblemente otras plataformas, permite a atacantes dependientes del contexto ejecutar código de su elección a través de ciertos valores maxsi... • https://www.exploit-db.com/exploits/29808 •

CVE-2007-1884
https://notcve.org/view.php?id=CVE-2007-1884
06 Apr 2007 — Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary ... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 •

CVE-2007-1888
https://notcve.org/view.php?id=CVE-2007-1888
06 Apr 2007 — Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API. Un desbordamiento de búfer en la función sqlite_decode_binary en el archivo s... • http://osvdb.org/39177 •

CVE-2007-1889
https://notcve.org/view.php?id=CVE-2007-1889
06 Apr 2007 — Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize. Error de signo de entero en la función _zend_mm_alloc_int en Zend Memory Manager de PHP 5.2.0 permite a atacantes remotos ejecutar código de su elección mediant... • http://secunia.com/advisories/25056 •

CVE-2007-1886
https://notcve.org/view.php?id=CVE-2007-1886
06 Apr 2007 — Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an "off by one overflow." Desbordamiento de enteros en la función str_replace del PHP 4.4.5 y PHP 5.2.1 permite a los atacantes dependientes del contexto tener un impacto desconocido mediante una cadena de búsqueda de un solo carácter en conjunción con una cadena de sus... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 •

CVE-2007-1883
https://notcve.org/view.php?id=CVE-2007-1883
06 Apr 2007 — PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters. PHP 4.0.0 hasta 4.4.6 y 5.0.0 hasta 5.2.1 permite a atacantes dependientes del contexto leer localizaciones de memoria de su elección a través de una interrupción que di... • http://secunia.com/advisories/24542 •

CVE-2007-1885
https://notcve.org/view.php?id=CVE-2007-1885
06 Apr 2007 — Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter. NOTE: this is probably the same issue as CVE-2007-0906.6. Desbordamiento de búfer en la función en PHP 4 anterior a 4.4.5 y PHP 5 anterior a 5.2.1 permite a atacantes dependientes del contexto ejecutar código de su elección a través de ... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 •

CVE-2007-1001 – PHP 5.2.1 'GD' Extension - '.WBMP' File Integer Overflow
https://notcve.org/view.php?id=CVE-2007-1001
06 Apr 2007 — Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values. Los múltiples desbordamientos de enteros en las funciones (1) createwbmp y (2) readwbmp en el archivo wbmp.c en la biblioteca GD (libgd) en PHP versión 4.0.0 hasta 4.4.6 y versión 5.0.0 hasta 5.2.1 permiten que los ataca... • https://www.exploit-db.com/exploits/29823 • CWE-189: Numeric Errors •