Page 83 of 421 results (0.016 seconds)

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument. La función zend_hash_init en PHP versión 5 anterior a 5.2.1 y PHP versión 4 anterior a 4.4.5, cuando se ejecuta en una plataforma de 64 bits, permite a los atacantes dependiendo del contexto causar una denegación de servicio (bucle infinito) al deserializar ciertas expresiones de enteros, que solo causa que argumentos de 32 bits sean usados después de la comprobación de un valor negativo, como es demostrado por un argumento "a:2147483649:{". • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 http://osvdb.org/32762 http://rhn.redhat.com/errata/RHSA-2007-0089.html http://secunia.com/advisories/24195 http://secunia.com/advisories/24217 http://secunia.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 2

Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash). Error de fuera de rango por uno (Off-by-one) en la función str_ireplace en PHP 5.2.1 podría permitir a atacantes dependientes del contexto provocar una denegación de servicio (caída). • https://www.exploit-db.com/exploits/29577 http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37 http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html http://marc.info/?l=php-dev&m=117104930526516&w=2 http://marc.info/?l=php-dev&m=117106751715609&w=2 http://osvdb.org/33952 http://secunia.com/advisories/24514 http://secunia.com/advisories/24606 http://security.gentoo.org/glsa/glsa •

CVSS: 5.0EPSS: 4%CPEs: 77EXPL: 0

Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function. Desbordamiento de búfer por debajo en PHP anterior a 5.2.1 permite a atacantes provocar una denegación de servicio mediante vectores no especificados involucrando a la función sapi_header_op. • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html http://osvdb.org/32767 http://rhn.redhat.com/errata/RHSA-2007-0089.html http://secunia.com/advisories/24089 http://secunia.com/advisories/24195 http://secunia.com/advisories/24217 http://secunia.com/advisories/24236 http://secunia.com/advisories/24248 http://secunia.com/advisories/24284 http://secunia.com/advisories/24295 http •

CVSS: 7.5EPSS: 2%CPEs: 77EXPL: 0

Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function. Múltiples vulnerabilidades de cadena de formato en PHP anterior a 5.2.1 podría permitir a atacantes remotos ejecutar código de su elección mediante especificadores de cadena de formato a (1) todas las funciones *print en sistemas de 64 bits, y a (2) la función odbc_result_all. • ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html http://osvdb.org/32764 http://osvdb.org/32765 http://rhn.redhat.com/errata/RHSA-2007-0089.html http://secunia.com/advisories/24089 http://secunia.com/advisories/24195 http://secunia.com/advisories/24217 http://secunia.com/advisories/24236 http://secunia.com/advisories/24248 http://secunia.com/advisories/24284 http://secu •

CVSS: 7.5EPSS: 3%CPEs: 77EXPL: 0

PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension. NOTE: it is possible that this issue is a duplicate of CVE-2006-6383. PHP anterior a 5.2.1 permite a atacantes remotos evitar las restricciones safe_mode y open_basedir mediante vectores no especificados en la extensión de sesión. NOTAL: es posible que este asunto sea un duplicado de CVE-2006-6383. • http://osvdb.org/32768 http://secunia.com/advisories/24089 http://secunia.com/advisories/24419 http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html http://www.php.net/ChangeLog-5.php#5.2.1 http://www.php.net/releases/5_2_1.php http://www.securityfocus.com/bid/22496 http://www.trustix.org/errata/2007/0009 http://www.vupen.com/english/advisories/2007/0546 •