Page 66 of 422 results (0.039 seconds)

CVSS: 10.0EPSS: 2%CPEs: 25EXPL: 0

The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars." La función escapeshellcmd API en PHP anterior a 5.2.6 tiene impacto desconocido y vectores de ataque dependientes del contexto relacionados con "caracteres multibyte incompletos". • http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://secunia.com/advisories/30048 http://secunia.com/advisories/30083 http://secunia.com/advisories/30158 http://secunia.com/advisories/30288 http://secunia.com/advisories/30345 http://secunia.com/advisories/30411 http://secunia.com/advisories/30757 http://secunia.com/advisories/30828 http://secunia.com/advisories/30967 http:/&#x •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions). Desbordamiento de entero en PHP 5.2.5 y versiones anteriores permite a atacantes dependientes del contexto provocar una denegación de servicio y posiblemente tener otros impactos no especificados a través de un parámetro de formato printf con un especificador de gran anchura, en relación a la función php_sprintf_appendstring en formatted_print.c y posiblemente otras funciones para cadenas de formato (también conocido como funciones *printf). • http://cvs.php.net/viewvc.cgi/php-src/NEWS?revision=1.2027.2.547.2.1120&view=markup http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://secunia.com/advisories/30158 http://secunia.com/advisories/30345 http://secunia.com/advisories/30411 http://secunia.com/advisories/30967 http://secunia.com/advisories/31200 http://secunia.com/advisories/32746 http://security.gentoo.org/glsa/glsa-200811-05.xml http://securityreason.com/achievement_securityalert/52 h • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 4

curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence, a different vulnerability than CVE-2006-2563. curl/interface.c en la librería cURL (también conocido como libcurl) en PHP 5.2.4 y 5.2.5 permite a atacantes dependientes de contexto evitar las restricciones safe_mode y open_basedir, y leer ficheros de su elección mediante una petición file:// que contiene una secuencia \x00, una vulnerabilidad diferente de CVE-2006-2563. • https://www.exploit-db.com/exploits/31053 http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html http://secunia.com/advisories/30048 http://secunia.com/advisories/30411 http://secunia.com/advisories/31200 http://secunia.com • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution. PHP 5.2.5 y anteriores permite a atacantes dependientes del contexto provocar denegación de servicio (caida de aplicación) a través de una cadena larga en (1) el parámetro domain en la función dgettext, el parámetro message en las funciones (2) dcgettext o (3) gettext, el parámetro msgid1 en las funciones (4) dngettext o (5) ngettext, o el parámetro (6) classname en la función stream_wrapper_register. NOTA: esto podría no ser una vulnerabilidad en muchos entornos de servidores web que soportan múltiples hilos, a menos que esta cuestión se pueda demostrar para la ejecución de código. • https://www.exploit-db.com/exploits/30760 http://securityreason.com/securityalert/3365 http://securityreason.com/securityalert/3366 http://www.securityfocus.com/archive/1/483644/100/0/threaded http://www.securityfocus.com/archive/1/483648/100/0/threaded http://www.securityfocus.com/bid/26426 http://www.securityfocus.com/bid/26428 https://exchange.xforce.ibmcloud.com/vulnerabilities/38442 https://exchange.xforce.ibmcloud.com/vulnerabilities/38443 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 0

The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID. La función output_add_rewrite_var en PHP anterior a 5.2.5 rescribe formularios locales en los cuales el atributo ACTION referencia a una URL no local, lo caul permite a atacantes remotos obtener información potencialmente sensible a través de la lectura de respuestas para esta URL, como se demostró por la rescritura del formulario contenedor de una sesión local ID. • http://bugs.php.net/bug.php?id=42869 http://osvdb.org/38918 http://secunia.com/advisories/27659 http://secunia.com/advisories/27864 http://secunia.com/advisories/28249 http://secunia.com/advisories/30040 http://secunia.com/advisories/30828 http://secunia.com/advisories/31119 http://secunia.com/advisories/31124 http://secunia.com/advisories/31200 http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0242 http://www.debian.org/security/2008/dsa-1444 http://www.mandri • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •