Show filters
121 Total Results
Displaying 1-10 of 121
Sort by:
Attacker Value
Unknown
CVE-2014-9427
Disclosure Date: January 03, 2015 (last updated October 05, 2023)
sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
0
Attacker Value
Unknown
CVE-2013-4635
Disclosure Date: June 21, 2013 (last updated October 05, 2023)
Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
0
Attacker Value
Unknown
CVE-2013-2110
Disclosure Date: June 21, 2013 (last updated October 05, 2023)
Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
0
Attacker Value
Unknown
CVE-2013-1643
Disclosure Date: March 06, 2013 (last updated October 05, 2023)
The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
0
Attacker Value
Unknown
CVE-2013-1635
Disclosure Date: March 06, 2013 (last updated October 05, 2023)
ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
0
Attacker Value
Unknown
CVE-2012-1911
Disclosure Date: September 09, 2012 (last updated October 05, 2023)
Multiple SQL injection vulnerabilities in PHP Address Book 6.2.12 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) to_group parameter to group.php or (2) id parameter to vcard.php. NOTE: the edit.php vector is already covered by CVE-2008-2565.
0
Attacker Value
Unknown
CVE-2012-1912
Disclosure Date: September 09, 2012 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in preferences.php in PHP Address Book 7.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the from parameter. NOTE: the index.php vector is already covered by CVE-2008-2566.
0
Attacker Value
Unknown
CVE-2012-2688
Disclosure Date: July 20, 2012 (last updated October 04, 2023)
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
0
Attacker Value
Unknown
CVE-2012-3365
Disclosure Date: July 20, 2012 (last updated October 04, 2023)
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-2143
Disclosure Date: July 05, 2012 (last updated March 15, 2024)
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
0