Show filters
112 Total Results
Displaying 71-80 of 112
Sort by:
Attacker Value
Unknown
CVE-2007-1001
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
0
Attacker Value
Unknown
CVE-2007-1835
Disclosure Date: April 03, 2007 (last updated October 04, 2023)
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
0
Attacker Value
Unknown
CVE-2007-1824
Disclosure Date: April 02, 2007 (last updated October 04, 2023)
Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
0
Attacker Value
Unknown
CVE-2007-1825
Disclosure Date: April 02, 2007 (last updated October 04, 2023)
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.
0
Attacker Value
Unknown
CVE-2007-1717
Disclosure Date: March 28, 2007 (last updated October 04, 2023)
The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages. NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.
0
Attacker Value
Unknown
CVE-2007-1718
Disclosure Date: March 28, 2007 (last updated October 04, 2023)
CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
0
Attacker Value
Unknown
CVE-2007-1700
Disclosure Date: March 27, 2007 (last updated October 04, 2023)
The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
0
Attacker Value
Unknown
CVE-2007-1583
Disclosure Date: March 21, 2007 (last updated October 04, 2023)
The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
0
Attacker Value
Unknown
CVE-2007-1581
Disclosure Date: March 21, 2007 (last updated October 04, 2023)
The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources. NOTE: it was later reported that PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 are also affected.
0
Attacker Value
Unknown
CVE-2007-1582
Disclosure Date: March 21, 2007 (last updated October 04, 2023)
The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error handler, which can be used to destroy and modify internal resources.
0