Page 94 of 484 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long "To" header. • http://bugs.php.net/bug.php?id=15595 http://secunia.com/advisories/21202 http://www.redhat.com/support/errata/RHSA-2006-0567.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175040 https://access.redhat.com/security/cve/CVE-2002-2214 https://bugzilla.redhat.com/show_bug.cgi?id=1616931 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.osvdb.org/2111 http://www.redhat.com/support • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 5.0EPSS: 2%CPEs: 18EXPL: 0

The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy." • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545 http://marc.info/?l=bugtraq&m=103011916928204&w=2 http://marc.info/?l=bugtraq&m=105760591228031&w=2 http://www.debian.org/security/2002/dsa-168 http://www.kb.cert.org/vuls/id/410609 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082 http://www.novell.com/linux/security/advisories/2002_036_modphp4.html http://www.o •

CVSS: 5.0EPSS: 1%CPEs: 36EXPL: 1

move_uploaded_file in PHP does not does not check for the base directory (open_basedir), which could allow remote attackers to upload files to unintended locations on the system. • https://www.exploit-db.com/exploits/21347 http://bugs.php.net/bug.php?id=16128 http://marc.info/?l=bugtraq&m=101683938806677&w=2 http://online.securityfocus.com/archive/1/262999 http://online.securityfocus.com/archive/1/263259 http://www.iss.net/security_center/static/8591.php http://www.securityfocus.com/bid/4325 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed. • http://marc.info/?l=bugtraq&m=102734515923277&w=2 http://marc.info/?l=bugtraq&m=102734516023281&w=2 http://www.cert.org/advisories/CA-2002-21.html http://www.iss.net/security_center/static/9635.php http://www.kb.cert.org/vuls/id/929115 •