CVE-2007-4033
- EPSS 27.6%
- Veröffentlicht 27.07.2007 22:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloa...
CVE-2007-4010
- EPSS 4.03%
- Veröffentlicht 26.07.2007 00:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.
CVE-2007-3806
- EPSS 5.85%
- Veröffentlicht 17.07.2007 00:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platform...
CVE-2007-3799
- EPSS 10.32%
- Veröffentlicht 16.07.2007 22:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the sessio...
CVE-2007-3790
- EPSS 6.48%
- Veröffentlicht 15.07.2007 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.
CVE-2007-3378
- EPSS 3.06%
- Veröffentlicht 29.06.2007 18:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execu...
CVE-2007-3294
- EPSS 7.41%
- Veröffentlicht 20.06.2007 21:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unsp...
- EPSS 1.75%
- Veröffentlicht 13.06.2007 10:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it ...
CVE-2007-2872
- EPSS 21.05%
- Veröffentlicht 04.06.2007 17:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
- EPSS 1.16%
- Veröffentlicht 04.06.2007 17:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this ...