Page 81 of 412 results (0.016 seconds)

CVSS: 7.5EPSS: 8%CPEs: 17EXPL: 5

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions. • https://www.exploit-db.com/exploits/22425 https://www.exploit-db.com/exploits/22426 https://www.exploit-db.com/exploits/22419 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691 http://marc.info/?l=bugtraq&m=104869828526885&w=2 http://marc.info/?l=bugtraq&m=104878100719467&w=2 http://marc.info/?l=bugtraq&m=104931415307111&w=2 http://www.securityfocus.com/bid/7197 http://www.securityfocus.com/bid/7198 •

CVSS: 5.0EPSS: 26%CPEs: 17EXPL: 0

CRLF injection vulnerability in PHP 4.2.1 through 4.2.3, when allow_url_fopen is enabled, allows remote attackers to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0086.html http://archives.neohapsis.com/archives/bugtraq/2002-09/0132.html http://www.debian.org/security/2002/dsa-168 http://www.securityfocus.com/bid/5681 https://exchange.xforce.ibmcloud.com/vulnerabilities/10080 •

CVSS: 5.0EPSS: 0%CPEs: 49EXPL: 2

The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of "To" addresses, which triggers an error in the rfc822_write_address function. • http://bugs.php.net/bug.php?id=19280 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175040 https://access.redhat.com/security/cve/CVE-2002-2215 https://bugzilla.redhat.com/show_bug.cgi?id=1616932 •

CVSS: 7.8EPSS: 4%CPEs: 38EXPL: 2

php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments. • https://www.exploit-db.com/exploits/21632 http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000605.html http://online.securityfocus.com/archive/1/283586 http://www.iss.net/security_center/static/9646.php http://www.securityfocus.com/bid/5280 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.osvdb.org/2111 http://www.redhat.com/support • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •