Page 80 of 411 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 25EXPL: 0

Buffer overflows in PHP before 4.3.3 have unknown impact and unknown attack vectors. Desbordamiento de búfer en PHP anteriores a 4.3.3 tienen impacto desconocido y vectores de ataque desconocidos. • http://www.php.net/ChangeLog-4.php#4.3.3 http://www.php.net/release_4_3_3.php •

CVSS: 10.0EPSS: 0%CPEs: 25EXPL: 0

Integer overflows in (1) base64_encode and (2) the GD library for PHP before 4.3.3 have unknown impact and unknown attack vectors. Desbordamientos de enteros en base64_encode y la librería GD de PHP anteriores a 4.3.3 tienen impactos y vectores de ataque desconocidos. • http://www.php.net/ChangeLog-4.php#4.3.3 http://www.php.net/release_4_3_3.php •

CVSS: 4.3EPSS: 2%CPEs: 3EXPL: 2

Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la capacidad de soporte transparente de SID en PHP anteriores a 4.3.2 (session.use_trans_sid) permite a atacantes remotos insertar script arbitrario mediante el parámetro PHPSESSID • https://www.exploit-db.com/exploits/22696 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691 http://marc.info/?l=bugtraq&m=105449314612963&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://shh.thathost.com/secadv/2003-05-11-php.txt http://www.ciac.org/ciac/bulletins/n-112.shtml http://www.debian.org/security/2003/dsa-351 http://www.mandriva.com/security/advisories?name=MDKSA-2003:082 http://www.osvdb.org/4758 http://www.redhat •

CVSS: 7.5EPSS: 8%CPEs: 17EXPL: 5

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions. • https://www.exploit-db.com/exploits/22425 https://www.exploit-db.com/exploits/22426 https://www.exploit-db.com/exploits/22419 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691 http://marc.info/?l=bugtraq&m=104869828526885&w=2 http://marc.info/?l=bugtraq&m=104878100719467&w=2 http://marc.info/?l=bugtraq&m=104931415307111&w=2 http://www.securityfocus.com/bid/7197 http://www.securityfocus.com/bid/7198 •

CVSS: 5.0EPSS: 26%CPEs: 17EXPL: 0

CRLF injection vulnerability in PHP 4.2.1 through 4.2.3, when allow_url_fopen is enabled, allows remote attackers to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0086.html http://archives.neohapsis.com/archives/bugtraq/2002-09/0132.html http://www.debian.org/security/2002/dsa-168 http://www.securityfocus.com/bid/5681 https://exchange.xforce.ibmcloud.com/vulnerabilities/10080 •