CVE-2002-2309 – PHP Interpreter 3.0.x/4.0.x/4.1/4.2 - Direct Invocation Denial of Service
https://notcve.org/view.php?id=CVE-2002-2309
php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments. • https://www.exploit-db.com/exploits/21632 http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000605.html http://online.securityfocus.com/archive/1/283586 http://www.iss.net/security_center/static/9646.php http://www.securityfocus.com/bid/5280 • CWE-399: Resource Management Errors •
CVE-2002-0985
https://notcve.org/view.php?id=CVE-2002-0985
Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.osvdb.org/2111 http://www.redhat.com/support • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2002-0986
https://notcve.org/view.php?id=CVE-2002-0986
The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy." • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.kb.cert.org/vuls/id/410609 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.o •
CVE-2002-0484 – PHP 3.0.x/4.x - Move_Uploaded_File open_basedir Circumvention
https://notcve.org/view.php?id=CVE-2002-0484
move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. • https://www.exploit-db.com/exploits/21347 http://bugs.php.net/bug.php?id=16128 http://marc.info/?l=bugtraq&m=101683938806677&w=2 http://online.securityfocus.com/archive/1/262999 http://online.securityfocus.com/archive/1/263259 http://www.iss.net/security_center/static/8591.php http://www.securityfocus.com/bid/4325 •
CVE-2002-0229 – PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention
https://notcve.org/view.php?id=CVE-2002-0229
Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements. La característica de Modo Seguro (safe_mode) de PHP 3.0 a 4.1.0 permite a atacantes con acceso a la base de datos MySQL evadir las restricciones del Modo Seguro y leer ficheros arbitrarios usando sentencias SQL "LOAD DATA INFILE LOCAL". • https://www.exploit-db.com/exploits/21264 https://www.exploit-db.com/exploits/21266 https://www.exploit-db.com/exploits/21265 http://marc.info/?l=bugtraq&m=101286577109716&w=2 http://marc.info/?l=bugtraq&m=101304702002321&w=2 http://marc.info/?l=ntbugtraq&m=101285016125377&w=2 http://marc.info/?l=ntbugtraq&m=101303065423534&w=2 http://marc.info/? •