Page 92 of 568 results (0.011 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 2

Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286. Desbordamiento de búfer en el contador de referencia a variable de 16 bits en PHP 4 permite a atacantes locales o remotos dependientes del contexto ejecutar código de su elección al desbordar este contador, que causa que la misma variable sea destruida dos veces, vulnerabilidad relativa a CVE-2007-1286. • https://www.exploit-db.com/exploits/3394 http://secunia.com/advisories/24606 http://secunia.com/advisories/25056 http://security.gentoo.org/glsa/glsa-200703-21.xml http://www.novell.com/linux/security/advisories/2007_32_php.html http://www.osvdb.org/32770 http://www.php-security.org/MOPB/MOPB-01-2007.html http://www.securityfocus.com/bid/22765 • CWE-189: Numeric Errors •

CVSS: 7.6EPSS: 1%CPEs: 1EXPL: 2

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow. La función wddx_deserialize en wddx.c versiones 1.119.2.10.2.12 y 1.119.2.10.2.13 en PHP versión 5, como fue modificada en CVS en 20070224 y corregida en 20070304, llama a strlcpy donde strlcat fue prevista y usa argumentos inapropiados, lo que permite a atacantes dependiendo del contexto ejecutar código arbitrario por medio de un paquete WDDX con un solapamiento de un elemento STRING malformado, lo que desencadena un desbordamiento de búfer. • https://www.exploit-db.com/exploits/3404 http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?r1=1.119.2.10.2.13&r2=1.119.2.10.2.14 http://cvs.php.net/viewvc.cgi/php-src/ext/wddx/wddx.c?revision=1.119.2.10.2.14&view=markup http://www.osvdb.org/32775 http://www.php-security.org/MOPB/MOPB-09-2007.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991. Desbordamiento de enteros en la función substr_compare en PHP 5.2.1 y anteriores permite a atacantes dependientes del contexto leer memoria sensible a través de un valor en el argumento length, un vulnerabilidad diferente que CVE-2006-1991. • https://www.exploit-db.com/exploits/3424 http://secunia.com/advisories/24606 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http://secunia.com/advisories/25062 http://secunia.com/advisories/26895 http://security.gentoo.org/glsa/glsa-200703-21.xml http://us2.php.net/releases/5_2_2.php http://www.debian.org/security/2007/dsa-1283 http://www.mandriva.com/security/advisories?name=MDKSA-2007:187 http://www.novell.com/linux/security/advisories •

CVSS: 7.5EPSS: 8%CPEs: 73EXPL: 4

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource. Las funciones shomp en PHP anterior a 4.4.5, y anterior a 5.2.1 en las series 5.x, no verifica que sus argumentos corresponden a un recurso shmop, lo caul permite a atacantes dependientes del contexto leer y escribir localizaciones de memoria de su elección a través de argumentos asociados con un recurso inapropiado, como se demostró con un recurso de imagen GD. • https://www.exploit-db.com/exploits/3427 https://www.exploit-db.com/exploits/3426 http://secunia.com/advisories/24606 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http://secunia.com/advisories/25062 http://security.gentoo.org/glsa/glsa-200703-21.xml http://www.debian.org/security/2007/dsa-1283 http://www.novell.com/linux/security/advisories/2007_32_php.html http://www.osvdb.org/32781 http://www.php-security.org/MOPB/MOPB-15-2007.ht •

CVSS: 5.0EPSS: 1%CPEs: 72EXPL: 2

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read. El manejador de serialización php_binary en la extensión de sesión de PHP anterior a 4.4.5, y 5.x anterior a 5.2.1, permite a atacantes dependientes del contexto obtener información sensible (contenidos de memoria) a través de entradas de variables serializables con un valor length, lo cual dispara un desbordamiento de búfer de lectura. • https://www.exploit-db.com/exploits/3413 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html http://secunia.com/advisories/24514 http://secunia.com/advisories/24606 http://secunia.com/advisories/25025 http://secunia.com/advisories/25056 http://secunia.com/advisories/25057 http: •