Page 71 of 354 results (0.008 seconds)

CVSS: 7.5EPSS: 93%CPEs: 4EXPL: 0

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. Desbordamiento de buffer en:(1) PHP 4.1.0, 4.1.1 y 4.0.6 y anteriores y (2) php3_mime_split en PHP 3.0.x permite que atacantes remotos ejecuten código arbitrario a través de una petición de datos de formulario HTTP, vía POST, cuando "file_uploads" está activado. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468 http://marc.info/?l=bugtraq&m=101484705523351&w=2 http://marc.info/?l=bugtraq&m=101497256024338&w=2 http://marc.info/?l=bugtraq&m=101537076619812&w=2 http://marc.info/? •

CVSS: 10.0EPSS: 34%CPEs: 2EXPL: 3

PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs. • https://www.exploit-db.com/exploits/220 https://www.exploit-db.com/exploits/20286 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:75.php.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0204.html http://www.atstake.com/research/advisories/2000/a101200-1.txt http://www.calderasystems.com/support/security/advisories/CSSA-2000-037.0.txt http://www.linux-mandrake.com/en/security/MDKSA-2000-062.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA •

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 1

The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0477.html http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u http://www.securityfocus.com/bid/1649 https://exchange.xforce.ibmcloud.com/vulnerabilities/5190 •

CVSS: 10.0EPSS: 6%CPEs: 14EXPL: 1

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands. • https://www.exploit-db.com/exploits/19708 http://www.securityfocus.com/bid/911 •