Page 69 of 695 results (0.009 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

23 Jul 2002 — PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed. • http://marc.info/?l=bugtraq&m=102734515923277&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 3

03 May 2002 — Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements. La característica de Modo Seguro (safe_mode) de PHP 3.0 a 4.1.0 permite a atacantes con acceso a la base de datos MySQL evadir las restricciones del Modo Seguro y leer ficheros arbitrarios usando sentencias SQL "LOAD DATA INFILE LOCAL". • https://www.exploit-db.com/exploits/21264 •

CVSS: 5.3EPSS: 0%CPEs: 9EXPL: 0

03 May 2002 — PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path. PHP, cuando no está configurado con la opción ""display_errors = Off"" en el fichero php.ini, permite que atacantes remotos obtengan el path absoluto para un fichero inc... • http://marc.info/?l=bugtraq&m=101318944130790&w=2 •

CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0

25 Mar 2002 — PHP 4.0 through 4.1.1 stores session IDs in temporary files whose name contains the session ID, which allows local users to hijack web connections. PHP 4.0 a 4.1.1 almacena IDs en archivos temporales cuyo nombre contiene la sesión ID, que permite a usuarios locales secuestrar conexiones de web. • http://online.securityfocus.com/archive/1/250196 •

CVSS: 9.8EPSS: 93%CPEs: 4EXPL: 0

08 Mar 2002 — Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. Desbordamiento de buffer en:(1) PHP 4.1.0, 4.1.1 y 4.0.6 y anteriores y (2) php3_mime_split en PHP 3.0.x permite que atacantes remotos ejecuten código arbitrario a través de una petición de datos de formulario HTTP, vía POST, cuando "file_uploads" está activado. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 1

06 Dec 2001 — PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files. • http://online.securityfocus.com/archive/1/194425 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 5%CPEs: 1EXPL: 1

30 Jun 2001 — PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/20985 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

12 Mar 2001 — PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000373 •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

12 Jan 2001 — The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000373 •

CVSS: 10.0EPSS: 19%CPEs: 2EXPL: 3

19 Dec 2000 — PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs. • https://www.exploit-db.com/exploits/220 •