Page 70 of 353 results (0.015 seconds)

CVSS: 5.0EPSS: 0%CPEs: 49EXPL: 2

The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. • http://bugs.php.net/bug.php?id=19280 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175040 https://access.redhat.com/security/cve/CVE-2002-2215 https://bugzilla.redhat.com/show_bug.cgi?id=1616932 •

CVSS: 7.8EPSS: 4%CPEs: 38EXPL: 2

php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments. • https://www.exploit-db.com/exploits/21632 http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000605.html http://online.securityfocus.com/archive/1/283586 http://www.iss.net/security_center/static/9646.php http://www.securityfocus.com/bid/5280 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 36EXPL: 1

move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. • https://www.exploit-db.com/exploits/21347 http://bugs.php.net/bug.php?id=16128 http://marc.info/?l=bugtraq&m=101683938806677&w=2 http://online.securityfocus.com/archive/1/262999 http://online.securityfocus.com/archive/1/263259 http://www.iss.net/security_center/static/8591.php http://www.securityfocus.com/bid/4325 •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 3

Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements. La característica de Modo Seguro (safe_mode) de PHP 3.0 a 4.1.0 permite a atacantes con acceso a la base de datos MySQL evadir las restricciones del Modo Seguro y leer ficheros arbitrarios usando sentencias SQL "LOAD DATA INFILE LOCAL". • https://www.exploit-db.com/exploits/21264 https://www.exploit-db.com/exploits/21266 https://www.exploit-db.com/exploits/21265 http://marc.info/?l=bugtraq&m=101286577109716&w=2 http://marc.info/?l=bugtraq&m=101304702002321&w=2 http://marc.info/?l=ntbugtraq&m=101285016125377&w=2 http://marc.info/?l=ntbugtraq&m=101303065423534&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 93%CPEs: 4EXPL: 0

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. Desbordamiento de buffer en:(1) PHP 4.1.0, 4.1.1 y 4.0.6 y anteriores y (2) php3_mime_split en PHP 3.0.x permite que atacantes remotos ejecuten código arbitrario a través de una petición de datos de formulario HTTP, vía POST, cuando "file_uploads" está activado. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468 http://marc.info/?l=bugtraq&m=101484705523351&w=2 http://marc.info/?l=bugtraq&m=101497256024338&w=2 http://marc.info/?l=bugtraq&m=101537076619812&w=2 http://marc.info/? •