Page 66 of 560 results (0.021 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

PHP 5.2.5 does not enforce (a) open_basedir and (b) safe_mode_exec_dir restrictions for certain functions, which might allow local users to bypass intended access restrictions and call programs outside of the intended directory via the (1) exec, (2) system, (3) shell_exec, (4) passthru, or (5) popen functions, possibly involving pathnames such as "C:" drive notation. PHP v.5.2.5 no respeta las restricciones de ciertas funciones(a) open_basedir y(b) safe_mode_exec_dir, que pueden permitir a usuarios locales saltarse las restricciones de acceso previstas y las llamadas a programas externas del directorio previsto a través de las funciones (1) exec, (2) system, (3) shell_exec, (4) passthru, o(5) popen , probablemente relacionados con nombres de ruta como "C:" notación unidad. • https://www.exploit-db.com/exploits/32343 http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php http://www.securityfocus.com/bid/31064 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 1%CPEs: 4EXPL: 1

The exif_read_data function in the Exif module in PHP before 5.2.10 allows remote attackers to cause a denial of service (crash) via a malformed JPEG image with invalid offset fields, a different issue than CVE-2005-3353. La función exif_read_data en el módulo Exif en PHP anteriores v5.2.10 permite a atacantes remotos causar una denegación de servicio (caída) a través de una imagen JPEG mal formada con campos inválidos en offset, siendo un asunto diferente a CVE-2005-3353. • http://bugs.php.net/bug.php?id=48378 http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://osvdb.org/55222 http://secunia.com/advisories/35441 http://secunia.com/advisories/36462 http://secunia.com/advisories/37482 http://secunia.com/advisories/40262 http://www.debian.org/security/2009/dsa-1940 http://www.mandriva.com/security/advisories?name=MDVSA-2009:145 http://www.mandriva.com/security • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

The php_zip_make_relative_path function in php_zip.c in PHP 5.2.x before 5.2.9 allows context-dependent attackers to cause a denial of service (crash) via a ZIP file that contains filenames with relative paths, which is not properly handled during extraction. La función php_zip_make_relative_path en php_zip.c en PHP v5.2.x anteriores a v5.2.9 permite a atacantes, dependiendo del contexto, provocar una denegación de servicio (caída) a través de una fichero ZIP que contiene nombres de ficheros con las rutas relativas, lo que no está bien manejado durante la extracción. • http://cvs.php.net/viewvc.cgi/php-src/ext/zip/php_zip.c?r1=1.1.2.48&r2=1.1.2.49 http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html http://marc.info/?l=bugtraq&m=125017764422557&w=2 http://secunia.com/advisories/35685 http://secunia.com/advisories/36701 http://support.apple.com/kb/HT3865 http://www.openwall.com/lists/oss-security/2009/04/01/9 http://www& • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 9%CPEs: 10EXPL: 0

The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function. La función JSON_parser (ext/json/JSON_parser.c) en PHP v5.2.x anteriores a v5.2.9 permite a atacantes remotos provocar una denegación de servicio (falta de segmentación) a través de una cadena formada de forma incorrecta a la función API json_decode. • http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15 http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html http://secunia.com/advisories/34770 http://secunia.com/advisories/34830 http://secunia.com/advisories/34933 http://secunia.com/advisories/35003 http://secunia.com/advisories/35007 http://secunia.com/advisories/35306 http://secunia.com •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 2

PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server. PHP v4.4.4, v5.1.6, y otras versiones, cuando están ejecutando Apache, permite a usuarios locales modificar el comportamiento de otros sitios hospedados en el mismo servidor web mediante la modificación de la característica mbstring.func_overload dentro de .htaccess, lo que produce que esta característica sea aplicada a otros sistemas virtuales alojados en el mismo servidor. • https://www.exploit-db.com/exploits/32769 http://bugs.php.net/bug.php?id=27421 http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html http://secunia.com/advisories/34642 http://secunia.com/advisories/34830 http://secunia.com/advisories/35003 http://secunia.com/advisories/35007 http://secunia.com/advisories/35306 http://www.debian.org/security/2009/dsa-1789 http://www.openwall.com/lists/oss-security/2009/01/30/1 http://www.openwall.com/lists • CWE-134: Use of Externally-Controlled Format String •