Page 70 of 557 results (0.016 seconds)

CVSS: 10.0EPSS: 12%CPEs: 9EXPL: 1

The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI. La función init_request_info en sapi/cgi/cgi_main.c en PHP en versiones anteriores a 5.2.6 no considera correctamente la precedencia del operador cuando calcula la longitud de PATH_TRANSLATED, lo que podrían permitir a atacantes remotos ejecutar código arbitrario a través de una URI manipulada. • http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437 http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://marc.info/?l=bugtraq&m=124654546101607&w=2 http://marc.info/?l=bugtraq&m=125631037611762&w=2 http://secunia.com/advisories/30048 http://secunia.com/advisories/30083 http:/ • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 10.0EPSS: 1%CPEs: 25EXPL: 1

Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors. Desbordamiento de búfer basado en pila en el FastCGI SAPI (fastcgi.c) en PHP en versiones anteriores a 5.2.6 tiene impacto y vectores de ataque desconocidos. • http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/fastcgi.c?r1=1.44&r2=1.45&diff_format=u http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://secunia.com/advisories/30048 http://secunia.com/advisories/30083 http://secunia.com/advisories/30158 http://secunia.com/advisories/30345 http://secunia.com/advisories/30967 http://secunia.com/advisories/31200 http://secunia.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions). Desbordamiento de entero en PHP 5.2.5 y versiones anteriores permite a atacantes dependientes del contexto provocar una denegación de servicio y posiblemente tener otros impactos no especificados a través de un parámetro de formato printf con un especificador de gran anchura, en relación a la función php_sprintf_appendstring en formatted_print.c y posiblemente otras funciones para cadenas de formato (también conocido como funciones *printf). • http://cvs.php.net/viewvc.cgi/php-src/NEWS?revision=1.2027.2.547.2.1120&view=markup http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://secunia.com/advisories/30158 http://secunia.com/advisories/30345 http://secunia.com/advisories/30411 http://secunia.com/advisories/30967 http://secunia.com/advisories/31200 http://secunia.com/advisories/32746 http://security.gentoo.org/glsa/glsa-200811-05.xml http://securityreason.com/achievement_securityalert/52 h • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 4

curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence, a different vulnerability than CVE-2006-2563. curl/interface.c en la librería cURL (también conocido como libcurl) en PHP 5.2.4 y 5.2.5 permite a atacantes dependientes de contexto evitar las restricciones safe_mode y open_basedir, y leer ficheros de su elección mediante una petición file:// que contiene una secuencia \x00, una vulnerabilidad diferente de CVE-2006-2563. • https://www.exploit-db.com/exploits/31053 http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html http://secunia.com/advisories/30048 http://secunia.com/advisories/30411 http://secunia.com/advisories/31200 http://secunia.com • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Unspecified vulnerability in glob in PHP before 4.4.8, when open_basedir is enabled, has unknown impact and attack vectors. NOTE: this issue reportedly exists because of a regression related to CVE-2007-4663. Vulnerabilidad no especificada en glob de PHP versiones anteriores a 4.4.8, cuando open_basedir está habilitado, tiene impacto desconocido y vectores de ataque. NOTA: esta vulnerabilidad existe debido a una regresión relativa a CVE-2007-4663. • http://bugs.php.net/bug.php?id=41655 http://secunia.com/advisories/28318 http://secunia.com/advisories/28936 http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136 http://www.php.net/ChangeLog-4.php http://www.php.net/releases/4_4_8.php http://www.vupen.com/english/advisories/2008/0059 https://exchange.xforce.ibmcloud.com/vulnerabilities/39401 • CWE-264: Permissions, Privileges, and Access Controls •