Page 88 of 461 results (0.014 seconds)

CVSS: 7.5EPSS: 8%CPEs: 17EXPL: 5

Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions. • https://www.exploit-db.com/exploits/22425 https://www.exploit-db.com/exploits/22426 https://www.exploit-db.com/exploits/22419 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691 http://marc.info/?l=bugtraq&m=104869828526885&w=2 http://marc.info/?l=bugtraq&m=104878100719467&w=2 http://marc.info/?l=bugtraq&m=104931415307111&w=2 http://www.securityfocus.com/bid/7197 http://www.securityfocus.com/bid/7198 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in CGI module for PHP 4.3.0 allows attackers to access arbitrary files as the PHP user, and possibly execute PHP code, by bypassing the CGI force redirect settings (cgi.force_redirect or --enable-force-cgi-redirect). • http://marc.info/?l=bugtraq&m=104550977011668&w=2 http://marc.info/?l=bugtraq&m=104567042700840&w=2 http://marc.info/?l=bugtraq&m=104567137502557&w=2 http://www.iss.net/security_center/static/11343.php http://www.securityfocus.com/bid/6875 http://www.slackware.com/changelog/current.php?cpu=i386 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code. Desbordamiento de búfer basado en la pila en la función wordwrap en PHP posteriores a 4.1.2 y anteriores a 4.3.0 puede permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario. • http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0003.html http://bugs.php.net/bug.php?id=20927 http://marc.info/?l=bugtraq&m=104102689503192&w=2 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:019 http://www.novell.com/linux/security/advisories/2003_009_mod_php4.html http://www.redhat.com/support/errata/RHSA-2003-017.html http://www.securityfocus.com/advisories/4862 http://www.securityfocus.com/bid/6488 https://exchange.xforce.ibmcloud.com/vuln •

CVSS: 5.0EPSS: 26%CPEs: 17EXPL: 0

CRLF injection vulnerability in PHP 4.2.1 through 4.2.3, when allow_url_fopen is enabled, allows remote attackers to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0086.html http://archives.neohapsis.com/archives/bugtraq/2002-09/0132.html http://www.debian.org/security/2002/dsa-168 http://www.securityfocus.com/bid/5681 https://exchange.xforce.ibmcloud.com/vulnerabilities/10080 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.2.3 allows remote attackers to inject arbitrary web script or HTML via the query string argument, as demonstrated using soinfo.php. • https://www.exploit-db.com/exploits/22725 http://archives.neohapsis.com/archives/bugtraq/2003-06/0027.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0021.html http://www.iss.net/security_center/static/10355.php http://www.techie.hopto.org/vulns/2002-36.txt •