Page 64 of 695 results (0.020 seconds)

CVSS: 9.3EPSS: 10%CPEs: 78EXPL: 0

07 Mar 2006 — The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. • http://bugs.php.net/bug.php?id=37265 •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

13 Jan 2006 — Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 8%CPEs: 2EXPL: 0

13 Jan 2006 — Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages. • http://secunia.com/advisories/18431 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 6.1EPSS: 1%CPEs: 49EXPL: 0

13 Jan 2006 — Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 3%CPEs: 4EXPL: 3

06 Jan 2006 — Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. • https://www.exploit-db.com/exploits/1406 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 36EXPL: 0

29 Nov 2005 — CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the "To" address argument. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc •

CVSS: 7.5EPSS: 5%CPEs: 27EXPL: 1

18 Nov 2005 — The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image. • http://bugs.php.net/bug.php?id=34704 •

CVSS: 9.1EPSS: 1%CPEs: 54EXPL: 0

01 Nov 2005 — Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd. • http://docs.info.apple.com/article.html?artnum=303382 •

CVSS: 9.1EPSS: 1%CPEs: 54EXPL: 0

01 Nov 2005 — Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives. • http://docs.info.apple.com/article.html?artnum=303382 •

CVSS: 9.1EPSS: 2%CPEs: 48EXPL: 0

01 Nov 2005 — The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected. • http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 •