Page 94 of 557 results (0.012 seconds)

CVSS: 10.0EPSS: 58%CPEs: 38EXPL: 1

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c). Desbordamiento de enteros en PHP 5 hasta la 5.1.6 y 4 anteriorer a 4.3.0 permite a un atacante remoto ejecutar código de su elección a través de un argumento a la funcion PHP unserializable con un valor grande para el número de elementos del array, lo cual dispara el desbordamiento en la función ecalloc en Zend Engine (Zend/zend_alloc.c). • https://www.exploit-db.com/exploits/28760 http://cvs.php.net/viewvc.cgi/ZendEngine2/zend_alloc.c?r1=1.161&r2=1.162 http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html http://rhn.redhat.com/errata/RHSA-2006-0688.html http://rhn.redhat.com/errata/RHSA-2006-0708.html http://secunia.com/advisories/22280 http://secunia.com/advisories/22281 http://secunia.com/advisories/22300 http://secunia.com/advisories/22331 http://secunia.com/advisories/22338 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.2EPSS: 0%CPEs: 54EXPL: 6

Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink. Condición de carrera en la función symlink en PHP 5.1.6 y anteriores permite a usuarios locales evitar la restricción open_basedir usando una combinación de las funciones symlink, mkdir, y unlink para cambiar la ruta de archivo tras la comprobación de open_basedir y antes de que el archivo es abierto por el sistema subyacente, como ha sido demostrado enlazando simbólicamente un enlace simbólico dentro de un subdirectorio, para que apunte a un directorio padre mediante secuencias .. (punto punto), y entonces desenlazar el enlace simbólico resultante. • https://www.exploit-db.com/exploits/10557 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html http://secunia.com/advisories/22235 http://secunia.com/advisories/22424 http://securityreason.com/securityalert/1692 http://securitytracker.com/id?1016977 http://www.hardened-php.net/advisory_082006.132.html http://www.mandriva.com/security/advisories?name=MDKSA-2006:185 http://www.neosecurityteam.net/index.php?action=advisories&id=26 http://www.securityfocus.com/archive&#x • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 3.6EPSS: 0%CPEs: 54EXPL: 3

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults. PHP 4.x up a 4.4.4 y PHP 5 up a 5.1.6, permite a un usuario local evitar las opciones httpd.conf del Apache HTTP Server, al igual que safe_mode y open_basedir, a través de la función ini_restore, lo cual restaura los valores de su php.ini (valor Master) por defecto. PHP versions 5.1.6 and below and versions 4.4.4 and below suffer from a php_admin* bypass via ini_restore(). • https://www.exploit-db.com/exploits/28504 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html http://secunia.com/advisories/22282 http://secunia.com/advisories/22331 http://secunia.com/advisories/22338 http://secunia.com/advisories/22424 http://secunia.com/advisories/25423 http: •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The (1) file_exists and (2) imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings. NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CVE-2006-1017. Las funciones (1) file_exists y (2) imap_reopen en PHP before 5.1.5 no validan para las configuraciones safe_mode y open_basedir, lo cual permite a un usuario local evitar las configuraciones. NOTA: la función error_log está cubierta por CVE-2006-3011, y la función imap_open está cubierta por CVE-2006-1017. • http://secunia.com/advisories/21546 http://secunia.com/advisories/21768 http://secunia.com/advisories/21842 http://secunia.com/advisories/22039 http://www.mandriva.com/security/advisories?name=MDKSA-2006:162 http://www.novell.com/linux/security/advisories/2006_52_php.html http://www.php.net/release_5_1_5.php http://www.securityfocus.com/bid/19582 http://www.ubuntu.com/usn/usn-342-1 http://www.vupen.com/english/advisories/2006/3318 •

CVSS: 10.0EPSS: 4%CPEs: 4EXPL: 0

The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read. La función stripos en PHP anterior a 5.1.5 tiene impacto desconocido y vectores de ataque relacionados con una lectura fuera de rango. • http://rhn.redhat.com/errata/RHSA-2006-0688.html http://secunia.com/advisories/21546 http://secunia.com/advisories/21842 http://secunia.com/advisories/22331 http://secunia.com/advisories/22538 http://securitytracker.com/id?1016984 http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm http://www.mandriva.com/security/advisories?name=MDKSA-2006:162 http://www.php.net/release_5_1_5.php http://www.securityfocus.com/bid/19582 http://www.ubuntu.com/usn/usn-362- •