Page 79 of 404 results (0.008 seconds)

CVSS: 5.0EPSS: 2%CPEs: 48EXPL: 0

The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected. • http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/17371 http://secunia.com/advisories/17490 http://secunia.com/advisories/17510 http://secunia.com/advisories/17531 http://secunia.com/advisories/17557 http://secunia.com/advisories/17559 http://secunia.com/advisories/18054 http://secunia.com/advisories/18198 http://secunia.com/advisories/18669 http://secunia.com/advisories/21252 http: •

CVSS: 4.3EPSS: 77%CPEs: 48EXPL: 1

Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a "stacked array assignment." • https://www.exploit-db.com/exploits/26442 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/17371 http://secunia.com/advisories/17490 http://secunia.com/advisories/17510 http://secunia.com/advisories/17531 http://secunia.com/advisories/17557 http://secunia.com/advisories/17559 http://secunia.com/advisories/18198 http://secunia.com/advisories/18669 http://secunia.com/advisories/21252 •

CVSS: 2.1EPSS: 0%CPEs: 44EXPL: 0

The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0491.html http://bugs.gentoo.org/show_bug.cgi?id=107602 http://docs.info.apple.com/article.html?artnum=303382 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://marc.info/?l=bugtraq&m=113019286208204&w=2 http://secunia.com/advisories/17510 http://secunia.com/advisories/17557 http://secunia.com/advisories/18198 http://secunia& •

CVSS: 5.0EPSS: 7%CPEs: 4EXPL: 0

The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://secunia.com/advisories/14792 http://securitytracker.com/id?1013619 http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.osvdb.org/15183 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/support/errata/RHSA-2005-406.html http://www.securityfocus.com/archive/1/394797 http://www.vupen&# •

CVSS: 5.0EPSS: 13%CPEs: 4EXPL: 1

The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://secunia.com/advisories/14792 http://securitytracker.com/id?1013619 http://www.debian.org/security/2005/dsa-708 http://www.debian.org/security/2005/dsa-729 http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.osvdb.org/15184 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/suppo •