Show filters
101 Total Results
Displaying 61-70 of 101
Sort by:
Attacker Value
Unknown
CVE-2007-1890
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.
0
Attacker Value
Unknown
CVE-2007-1883
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
0
Attacker Value
Unknown
CVE-2007-1888
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter. NOTE: some PHP installations use a bundled version of sqlite without this vulnerability. The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
0
Attacker Value
Unknown
CVE-2007-1001
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
0
Attacker Value
Unknown
CVE-2007-1835
Disclosure Date: April 03, 2007 (last updated October 04, 2023)
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
0
Attacker Value
Unknown
CVE-2007-1825
Disclosure Date: April 02, 2007 (last updated October 04, 2023)
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.
0
Attacker Value
Unknown
CVE-2007-1777
Disclosure Date: March 30, 2007 (last updated October 04, 2023)
Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.
0
Attacker Value
Unknown
CVE-2007-1717
Disclosure Date: March 28, 2007 (last updated October 04, 2023)
The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages. NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.
0
Attacker Value
Unknown
CVE-2007-1718
Disclosure Date: March 28, 2007 (last updated October 04, 2023)
CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
0
Attacker Value
Unknown
CVE-2007-1700
Disclosure Date: March 27, 2007 (last updated October 04, 2023)
The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
0