3 results (0.001 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

09 Mar 2007 — ini_modifier (sgid-zendtech) in Zend Platform 2.2.3 and earlier allows local users to modify the system php.ini file by editing a copy of php.ini file using the -f parameter, and then performing a symlink attack using the directory that contains the attacker-controlled php.ini file, and linking this directory to /usr/local/Zend/etc. ini_modifier (sgid-zendtech) en Zend Platform 2.2.3 y anteriores permite a usuarios locales modificar el archvio de sistema php.ini a través de la edición de una copia del archi... • https://www.exploit-db.com/exploits/29712 •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

29 Aug 2006 — Multiple buffer overflows in the (a) Session Clustering Daemon and the (b) mod_cluster module in the Zend Platform 2.2.1 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a (1) empty or (2) crafted PHP session identifier (PHPSESSID). Múltiples desbordamientos de búfer en el (a) Session Clustering Daemon y el módulo (b) mod_cluster en Zend Platform 2.2.1 y versiones anteriores permiten a atacantes remotos provocar una denegación de servicio (caída) o ejecut... • http://marc.info/?l=full-disclosure&m=115642248226217&w=2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 0

29 Aug 2006 — Directory traversal vulnerability in Zend Platform 2.2.1 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the final component of the PHP session identifier (PHPSESSID). NOTE: in some cases, this issue can be leveraged to perform direct static code injection. Vulnerabilidad de atravesamiento de directorios en Zend Platform 2.2.1 y anteriores permite a atacantes remotos sobrescribir archivos de su elección mediante una secuencia .. (punto punto) en el componente ... • http://secunia.com/advisories/21573 •