Page 98 of 535 results (0.013 seconds)

CVSS: 5.0EPSS: 1%CPEs: 71EXPL: 0

exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion. • http://cvs.php.net/diff.php/php-src/ext/exif/exif.c?r1=1.118.2.29&r2=1.118.2.30&ty=u http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.redhat.com/support/errata/RHSA-2005-406.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.m •

CVSS: 5.0EPSS: 7%CPEs: 4EXPL: 0

The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://secunia.com/advisories/14792 http://securitytracker.com/id?1013619 http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.osvdb.org/15183 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/support/errata/RHSA-2005-406.html http://www.securityfocus.com/archive/1/394797 http://www.vupen&# •

CVSS: 5.0EPSS: 13%CPEs: 4EXPL: 1

The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek. • http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html http://secunia.com/advisories/14792 http://securitytracker.com/id?1013619 http://www.debian.org/security/2005/dsa-708 http://www.debian.org/security/2005/dsa-729 http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:072 http://www.osvdb.org/15184 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/suppo •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

PHP 4 (PHP4) allows attackers to cause a denial of service (daemon crash) by using the readfile function on a file whose size is a multiple of the page size. • http://www.linuxcompatible.org/story42495.html http://www.securityfocus.com/bid/12665 •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 3

PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function. • https://www.exploit-db.com/exploits/24711 http://marc.info/?l=bugtraq&m=109898213806099&w=2 http://marc.info/?l=bugtraq&m=110625060220934&w=2 http://securitytracker.com/id?1011984 http://www.redhat.com/support/errata/RHSA-2005-405.html http://www.redhat.com/support/errata/RHSA-2005-406.html http://www.securityfocus.com/bid/11557 https://bugzilla.fedora.us/show_bug.cgi?id=2344 https://exchange.xforce.ibmcloud.com/vulnerabilities/17900 https://oval.cisecurity.org/repos •