Page 70 of 453 results (0.038 seconds)

CVSS: 6.8EPSS: 69%CPEs: 75EXPL: 1

The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation. La función mb_parse_str del PHP 4.0.0 hasta la 4.4.6 y de la 5.0.0 hasta la 5.2.1 establece la bandera interna del registro global y no la deshabilita en ciertos casos cuando la secuencia de comandos termina, lo que permite a atacantes remotos invocar secuencias de comandos PHP disponibles con la funcionalidad del registro global, lo que no es detectado por estas secuencias de comandos, como lo demostrado forzando una violación del límite de memoria. • https://www.exploit-db.com/exploits/29752 http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://rhn.redhat.com/errata/RHSA-2007-0155.html http://secunia.com/advisories/24909 http://secunia.com/advisories/24924 http://secunia.com/advisories/24945 http://secunia.com/advisories/24965 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http://secunia.com/advisories/25062 http&# •

CVSS: 6.8EPSS: 2%CPEs: 1EXPL: 2

Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation. Una vulnerabilidad de doble liberación en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, permite a atacantes dependiendo del contexto ejecutar código arbitrario mediante la interrupción de la función session_regenerate_id, como es demostrado mediante la llamada de un manejador de errores de espacio de usuario o desencadenando una violación de límite de memoria. • https://www.exploit-db.com/exploits/3479 http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/24505 http://secunia.com/advisories/25025 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http://secunia.com/advisories/25062 http://secunia.com/advisories/25445 http://secunia.com/advisories/26235 http://security.gentoo.org/glsa/glsa-200705-19.xml http& •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called. La función array_user_key_compare en PHP 4.4.6 y anteriores, y 5.X hasta la 5.2.1, hace una llamada erronea a zval_dtor, lo cual dispara una corrupción de memoria y permite a usuarios locales evitar el safe_mode y ejecutar código de su elección a través de ciertas operaciones de desasignación después de que array_user_key_compare haya sido llamada. • https://www.exploit-db.com/exploits/3499 http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/24542 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http://secunia.com/advisories/25445 http://secunia.com/advisories/26235 http://security.gentoo.org/glsa/glsa-200705-19.xml http://us2.php.net/releases/4_4_7.php http://us2.php.net/releases& •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument. Múltiples desbordamientos de búfer en las funciones (1) ibase_connect y (2) ibase_pconnect en la extensión iterbase en PHP 4.4.6 y anteriores permite a atacantes dependientes del contexto ejecutar código de su elección a través de un argumento. • https://www.exploit-db.com/exploits/3488 http://retrogod.altervista.org/php_446_ibase_connect_bof.html http://secunia.com/advisories/24529 http://securityreason.com/securityalert/2439 http://www.securityfocus.com/archive/1/462931/100/0/threaded http://www.securityfocus.com/bid/22976 https://exchange.xforce.ibmcloud.com/vulnerabilities/33019 •

CVSS: 7.8EPSS: 1%CPEs: 76EXPL: 0

The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories. La URL encapsulada compress.bzip2:// proporcionada por la extensión bz2 en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, no implementa comprobaciones de safemode o open_basedir, lo que permite a atacantes remotos leer archivos bzip2 ubicados fuera de los directorios previstos. • http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://secunia.com/advisories/25056 http://secunia.com/advisories/26235 http://us2.php.net/releases/4_4_7.php http://us2.php.net/releases/5_2_2.php http://www.novell.com/linux/security/advisories/2007_32_php.html http://www.php-security.org/MOPB/MOPB-21-2007.html http://www.securityfocus.com/bid/22954 http://www.securityfocus.com&# • CWE-264: Permissions, Privileges, and Access Controls •