Page 91 of 461 results (0.008 seconds)

CVSS: 7.5EPSS: 93%CPEs: 4EXPL: 0

Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled. Desbordamiento de buffer en:(1) PHP 4.1.0, 4.1.1 y 4.0.6 y anteriores y (2) php3_mime_split en PHP 3.0.x permite que atacantes remotos ejecuten código arbitrario a través de una petición de datos de formulario HTTP, vía POST, cuando "file_uploads" está activado. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468 http://marc.info/?l=bugtraq&m=101484705523351&w=2 http://marc.info/?l=bugtraq&m=101497256024338&w=2 http://marc.info/?l=bugtraq&m=101537076619812&w=2 http://marc.info/? •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 1

PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files. • http://online.securityfocus.com/archive/1/194425 http://www.osvdb.org/5440 http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz http://www.redhat.com/support/errata/RHSA-2002-035.html https://access.redhat.com/security/cve/CVE-2001-1247 https://bugzilla.redhat.com/show_bug.cgi?id=1616655 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 1

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/20985 http://online.securityfocus.com/archive/1/194425 http://www.iss.net/security_center/static/6787.php http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz http://www.redhat.com/support/errata/RHSA-2002-102.html http://www.redhat.com/support/errata/RHSA-2002-129.html http://www.redhat.com/support/errata/RHSA-2003-159.html http://www.securityfocus.com/bid/2954 https://access.redhat.com/security/cve/CVE-2001&# • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000373 http://marc.info/?l=bugtraq&m=97957961212852 http://www.debian.org/security/2001/dsa-020 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-013.php3 http://www.redhat.com/support/errata/RHSA-2000-136.html http://www.securityfocus.com/bid/2206 https://exchange.xforce.ibmcloud.com/vulnerabilities/5940 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000373 http://marc.info/?l=bugtraq&m=97957961212852 http://www.debian.org/security/2001/dsa-020 http://www.iss.net/security_center/static/5939.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-013.php3 http://www.redhat.com/support/errata/RHSA-2000-136.html http://www.securityfocus.com/bid/2205 •