Show filters
117 Total Results
Displaying 81-90 of 117
Sort by:
Attacker Value
Unknown
CVE-2006-5178
Disclosure Date: October 10, 2006 (last updated October 04, 2023)
Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.
0
Attacker Value
Unknown
CVE-2006-4625
Disclosure Date: September 12, 2006 (last updated October 04, 2023)
PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.
0
Attacker Value
Unknown
CVE-2006-4433
Disclosure Date: August 29, 2006 (last updated October 04, 2023)
PHP before 4.4.3 and 5.x before 5.1.4 does not limit the character set of the session identifier (PHPSESSID) for third party session handlers, which might make it easier for remote attackers to exploit other vulnerabilities by inserting PHP code into the PHPSESSID, which is stored in the session file. NOTE: it could be argued that this not a vulnerability in PHP itself, rather a design limitation that enables certain attacks against session handlers that do not account for this limitation.
0
Attacker Value
Unknown
CVE-2006-4020
Disclosure Date: August 08, 2006 (last updated October 04, 2023)
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
0
Attacker Value
Unknown
CVE-2006-3011
Disclosure Date: June 26, 2006 (last updated October 04, 2023)
The error_log function in basic_functions.c in PHP before 4.4.4 and 5.x before 5.1.5 allows local users to bypass safe mode and open_basedir restrictions via a "php://" or other scheme in the third argument, which disables safe mode.
0
Attacker Value
Unknown
CVE-2006-3017
Disclosure Date: June 14, 2006 (last updated October 04, 2023)
zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.
0
Attacker Value
Unknown
CVE-2006-1608
Disclosure Date: April 10, 2006 (last updated February 22, 2025)
The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.
0
Attacker Value
Unknown
CVE-2006-1494
Disclosure Date: April 10, 2006 (last updated February 22, 2025)
Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.
0
Attacker Value
Unknown
CVE-2006-1490
Disclosure Date: March 29, 2006 (last updated February 22, 2025)
PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
0
Attacker Value
Unknown
CVE-2006-1017
Disclosure Date: March 07, 2006 (last updated February 22, 2025)
The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.
0