Page 84 of 477 results (0.011 seconds)

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 0

Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html http://secunia.com/advisories/18431 http://secunia.com/advisories/18697 http://secunia.com/advisories/19012 http://secunia.com/advisories/19179 http://secunia.com/advisories/19355 http://secunia.com/advisories/25945 http://securitytracker.com/id?1015484 http://www.debian.org/security/2007/dsa-1331 http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml http://www.hardened-php.net/advisory_012006.1 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 3

Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. • https://www.exploit-db.com/exploits/1406 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0274.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041013.html http://secunia.com/advisories/18275 http://www.osvdb.org/22232 http://www.php.net/ChangeLog-4.php#4.4.3 http://www.securityfocus.com/archive/1/420986/100/0/threaded http://www.securityfocus.com/bid/16145 http://www.vupen.com/english/advisories/2006/0046 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 36EXPL: 0

CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the "To" address argument. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://bugs.php.net/bug.php?id=35307 http://rhn.redhat.com/errata/RHSA-2006-0276.html http://secunia.com/advisories/17763 http://secunia.com/advisories/18054 http://secunia.com/advisories/18198 http://secunia.com/advisories/19832 http://secunia.com/advisories/20210 http://secunia.com/advisories/20951 http://securitytracker.com/id?1015296 http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm& •

CVSS: 5.0EPSS: 5%CPEs: 27EXPL: 1

The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image. • http://bugs.php.net/bug.php?id=34704 http://docs.info.apple.com/article.html?artnum=303382 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://rhn.redhat.com/errata/RHSA-2005-831.html http://secunia.com/advisories/17371 http://secunia.com/advisories/17490 http://secunia.com/advisories/17531 http://secunia.com/advisories/17557 http://secunia.com/advisories/18054 http://secunia.com& •

CVSS: 7.5EPSS: 1%CPEs: 54EXPL: 0

Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives. • http://docs.info.apple.com/article.html?artnum=303382 http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html http://secunia.com/advisories/17371 http://secunia.com/advisories/17510 http://secunia.com/advisories/18054 http://secunia.com/advisories/18198 http://secunia.com/advisories/19064 http://secunia.com/advisories/22691 http://securityreason.com/securityalert/525 http://www.gentoo.org/security/en •