Page 72 of 411 results (0.031 seconds)

CVSS: 7.5EPSS: 1%CPEs: 77EXPL: 0

Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825). Los múltiples desbordamientos de búfer en PHP versión anterior a 5.2.1 permiten a los atacantes causar una denegación de servicio y posiblemente ejecutar código arbitrario por medio de vectores no específicos en las extensiones (1) session, (2) zip, (3) imap y (4) sqlite; (5) filtros de flujo; y las funciones (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user y (10) ibase_modify_user. NOTA: el vector 6 podría ser en realidad un desbordamiento de entero (CVE-2007-1885). • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html http://osvdb.org/34706 http://osvdb.org/34707 http://osvdb.org/34708 http://osvdb.org/34709 http://osvdb.org/34710 http://osvdb.org/34711 http://osvdb.org/34712 http://osvdb.org/34713 http://osvdb.org/34714 http://osvdb.org/34715 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 0

Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494. Vulnerabilidades no especificada en PHP, probablemente anterior a 5.2.0, permite a un usuario local evitar las restricciones open_basedir y llevar a cabo acciones no específicas a través de vectores no especificados que afectan a (1)chdir y (2)funciones tempnam. NOTA: el vector tempnam podría solaparse con CVE-2006-1494. • http://www.php.net/releases/5_2_0.php http://www.ubuntu.com/usn/usn-375-1 •

CVSS: 7.5EPSS: 49%CPEs: 16EXPL: 0

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions. Desbordamiento de búfer en PHP anterior a 5.2.0 permite a un atacante remoto ejecutar código de su elección mediante entradas UTF-8 manipuladas a las funciones (1) htmlentities o (2) htmlspecialchars. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://docs.info.apple.com/article.html?artnum=304829 http://issues.rpath.com/browse/RPL-761 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://rhn.redhat.com/errata/RHSA-2006-0736.html http://secunia.com/advisories/22653 http://secunia.com/advisories/22685 http://secunia.com/advisories/22688 http://secunia.com/advisories/22693 http://secunia.com/advisories/22713 http://se •

CVSS: 10.0EPSS: 58%CPEs: 38EXPL: 1

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c). Desbordamiento de enteros en PHP 5 hasta la 5.1.6 y 4 anteriorer a 4.3.0 permite a un atacante remoto ejecutar código de su elección a través de un argumento a la funcion PHP unserializable con un valor grande para el número de elementos del array, lo cual dispara el desbordamiento en la función ecalloc en Zend Engine (Zend/zend_alloc.c). • https://www.exploit-db.com/exploits/28760 http://cvs.php.net/viewvc.cgi/ZendEngine2/zend_alloc.c?r1=1.161&r2=1.162 http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html http://rhn.redhat.com/errata/RHSA-2006-0688.html http://rhn.redhat.com/errata/RHSA-2006-0708.html http://secunia.com/advisories/22280 http://secunia.com/advisories/22281 http://secunia.com/advisories/22300 http://secunia.com/advisories/22331 http://secunia.com/advisories/22338 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.2EPSS: 0%CPEs: 54EXPL: 6

Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink. Condición de carrera en la función symlink en PHP 5.1.6 y anteriores permite a usuarios locales evitar la restricción open_basedir usando una combinación de las funciones symlink, mkdir, y unlink para cambiar la ruta de archivo tras la comprobación de open_basedir y antes de que el archivo es abierto por el sistema subyacente, como ha sido demostrado enlazando simbólicamente un enlace simbólico dentro de un subdirectorio, para que apunte a un directorio padre mediante secuencias .. (punto punto), y entonces desenlazar el enlace simbólico resultante. • https://www.exploit-db.com/exploits/10557 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html http://secunia.com/advisories/22235 http://secunia.com/advisories/22424 http://securityreason.com/securityalert/1692 http://securitytracker.com/id?1016977 http://www.hardened-php.net/advisory_082006.132.html http://www.mandriva.com/security/advisories?name=MDKSA-2006:185 http://www.neosecurityteam.net/index.php?action=advisories&id=26 http://www.securityfocus.com/archive&#x • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •