Show filters
87 Total Results
Displaying 11-20 of 87
Sort by:
Attacker Value
Unknown
CVE-2012-6113
Disclosure Date: January 19, 2013 (last updated October 05, 2023)
The openssl_encrypt function in ext/openssl/openssl.c in PHP 5.3.9 through 5.3.13 does not initialize a certain variable, which allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data.
0
Attacker Value
Unknown
CVE-2012-5381
Disclosure Date: October 11, 2012 (last updated November 08, 2023)
Untrusted search path vulnerability in the installation functionality in PHP 5.3.17, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\PHP directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the PHP installation
0
Attacker Value
Unknown
CVE-2011-1398
Disclosure Date: August 30, 2012 (last updated October 05, 2023)
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
0
Attacker Value
Unknown
CVE-2012-3450
Disclosure Date: August 06, 2012 (last updated October 04, 2023)
pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value.
0
Attacker Value
Unknown
CVE-2012-2688
Disclosure Date: July 20, 2012 (last updated October 04, 2023)
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
0
Attacker Value
Unknown
CVE-2012-3365
Disclosure Date: July 20, 2012 (last updated October 04, 2023)
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-1172
Disclosure Date: May 24, 2012 (last updated October 04, 2023)
The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
0
Attacker Value
Unknown
CVE-2012-2376
Disclosure Date: May 21, 2012 (last updated October 04, 2023)
Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.
0
Attacker Value
Unknown
CVE-2012-2335
Disclosure Date: May 11, 2012 (last updated October 04, 2023)
php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
0
Attacker Value
Unknown
CVE-2012-2336
Disclosure Date: May 11, 2012 (last updated November 08, 2023)
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
0