Page 60 of 619 results (0.021 seconds)

CVSS: 9.8EPSS: 4%CPEs: 3EXPL: 1

15 Oct 2003 — The php_check_safe_mode_include_dir function in fopen_wrappers.c of PHP 4.3.x returns a success value (0) when the safe_mode_include_dir variable is not specified in configuration, which differs from the previous failure value and may allow remote attackers to exploit file include vulnerabilities in PHP applications. La función php_check_safe_module_include_dir en fopen_wrappers.c de PHP 4.3.x devuelve una valor de éxito (0) cuando la variable safe_mode_include_dir no está especificada en la configuración, ... • https://www.exploit-db.com/exploits/22911 •

CVSS: 6.1EPSS: 1%CPEs: 3EXPL: 2

20 Jun 2003 — Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la capacidad de soporte transparente de SID en PHP anteriores a 4.3.2 (session.use_trans_sid) permite a atacantes remotos insertar script arbitrario mediante el parámetro PHPSESSID • https://www.exploit-db.com/exploits/22696 •

CVSS: 9.8EPSS: 19%CPEs: 1EXPL: 3

29 Mar 2003 — Buffer overflow in openlog function for PHP 4.3.1 on Windows operating system, and possibly other OSes, allows remote attackers to cause a crash and possibly execute arbitrary code via a long filename argument. Desbordamiento de búfer en la función openlog de PHP 4.3.1 en Windows y posiblemente en otros Sistemas Operativos, permie a atacantes remotos causar la caída del sistema y posiblemente la ejecución de código arbitrario mediante un argumento nombre_de_fichero (filename) largo. • https://www.exploit-db.com/exploits/729 •

CVSS: 9.8EPSS: 7%CPEs: 17EXPL: 5

27 Mar 2003 — Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions. • https://www.exploit-db.com/exploits/22425 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2003 — Unknown vulnerability in CGI module for PHP 4.3.0 allows attackers to access arbitrary files as the PHP user, and possibly execute PHP code, by bypassing the CGI force redirect settings (cgi.force_redirect or --enable-force-cgi-redirect). • http://marc.info/?l=bugtraq&m=104550977011668&w=2 •

CVSS: 9.8EPSS: 1%CPEs: 5EXPL: 0

17 Jan 2003 — Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code. Desbordamiento de búfer basado en la pila en la función wordwrap en PHP posteriores a 4.1.2 y anteriores a 4.3.0 puede permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario. • http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0003.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

31 Dec 2002 — The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header. • http://bugs.php.net/bug.php?id=15595 •

CVSS: 7.8EPSS: 12%CPEs: 38EXPL: 2

31 Dec 2002 — php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments. • https://www.exploit-db.com/exploits/21632 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 49EXPL: 2

31 Dec 2002 — The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. • http://bugs.php.net/bug.php?id=19280 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

31 Dec 2002 — Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.2.3 allows remote attackers to inject arbitrary web script or HTML via the query string argument, as demonstrated using soinfo.php. • https://www.exploit-db.com/exploits/22725 •