Page 66 of 354 results (0.012 seconds)

CVSS: 7.5EPSS: 49%CPEs: 16EXPL: 0

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions. Desbordamiento de búfer en PHP anterior a 5.2.0 permite a un atacante remoto ejecutar código de su elección mediante entradas UTF-8 manipuladas a las funciones (1) htmlentities o (2) htmlspecialchars. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://docs.info.apple.com/article.html?artnum=304829 http://issues.rpath.com/browse/RPL-761 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://rhn.redhat.com/errata/RHSA-2006-0736.html http://secunia.com/advisories/22653 http://secunia.com/advisories/22685 http://secunia.com/advisories/22688 http://secunia.com/advisories/22693 http://secunia.com/advisories/22713 http://se •

CVSS: 6.2EPSS: 0%CPEs: 54EXPL: 6

Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink. Condición de carrera en la función symlink en PHP 5.1.6 y anteriores permite a usuarios locales evitar la restricción open_basedir usando una combinación de las funciones symlink, mkdir, y unlink para cambiar la ruta de archivo tras la comprobación de open_basedir y antes de que el archivo es abierto por el sistema subyacente, como ha sido demostrado enlazando simbólicamente un enlace simbólico dentro de un subdirectorio, para que apunte a un directorio padre mediante secuencias .. (punto punto), y entonces desenlazar el enlace simbólico resultante. • https://www.exploit-db.com/exploits/10557 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html http://secunia.com/advisories/22235 http://secunia.com/advisories/22424 http://securityreason.com/securityalert/1692 http://securitytracker.com/id?1016977 http://www.hardened-php.net/advisory_082006.132.html http://www.mandriva.com/security/advisories?name=MDKSA-2006:185 http://www.neosecurityteam.net/index.php?action=advisories&id=26 http://www.securityfocus.com/archive&#x • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.3EPSS: 1%CPEs: 5EXPL: 0

Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990. Múltiples vulnerabilidades de desbordamiento de búfer en las funciones (1) str_repeat y (2) wordwrap en ext/standard/string.c en PHP anterior a 5.1.5, cuando se uso sobre sistemas de 64-bit, tiene un impacto desconocido y ataque a vectores, una vulnerabilidad diferente que la CVE-2006-1990. • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11 http://rhn.redhat.com/errata/RHSA-2006-0688.html http://secunia.com/advisories/21546 http://secunia.com/advisories/21768 http://secunia.com/advisories/22004 http://secunia.com/advisories/22039 http://secunia.com/advisories/22069 http://secunia.com/advisories/22225 http://secunia.com/ • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 0

The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache. Los ficheros con extensión cURL (1) ext/curl/interface.c y(2) ext/curl/streams.c en PHP anterior a 5.1.5 permite la opción CURLOPT_FOLLOWLOCATION cuando open_basedir o safe_mode está habilitado, lo cual permite a un atacante realizar acciones no autorizadas, posiblemente relacionado con la caché realpath. • http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 http://secunia.com/advisories/21546 http://secunia.com/advisories/22039 http://secunia.com/advisories/30411 http://securitytracker.com/id?1016984 http://wiki.rpath.com/wiki/Advisor • CWE-862: Missing Authorization •

CVSS: 4.6EPSS: 0%CPEs: 77EXPL: 2

The error_log function in basic_functions.c in PHP before 4.4.4 and 5.x before 5.1.5 allows local users to bypass safe mode and open_basedir restrictions via a "php://" or other scheme in the third argument, which disables safe mode. La función error_log en basic_functions.c en PHP anterior v4.4.4 y v5.x anterior v5.1.5 permite a usuarios locales superar el modo de seguridad y las restricciones open_basedir a través de un "php://" u otros esquemas en el tercer argumento, que deshabilitan el modo seguro. • https://www.exploit-db.com/exploits/7171 http://cvs.php.net/viewvc.cgi/php-src/ext/standard/basic_functions.c?diff_format=u&view=log&pathrev=PHP_4_4 http://cvs.php.net/viewvc.cgi/php-src/ext/standard/basic_functions.c?r1=1.543.2.51.2.9&r2=1.543.2.51.2.10&pathrev=PHP_4_4&diff_format=u http://secunia.com/advisories/20818 http://secunia.com/advisories/21050 http://secunia.com/advisories/21125 http://secunia.com/advisories/21546 http://securityreason.com/ • CWE-264: Permissions, Privileges, and Access Controls •