Vulnerabilities > PHP > PHP > 5.2.12
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2010-05-07 | CVE-2010-1860 | Information Exposure vulnerability in PHP The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature. | 5.0 |
2010-03-26 | CVE-2010-1130 | Permissions, Privileges, and Access Controls vulnerability in PHP session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. | 5.0 |
2010-03-26 | CVE-2010-1129 | Improper Input Validation vulnerability in PHP The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function. | 7.5 |
2010-03-26 | CVE-2010-1128 | Cryptographic Issues vulnerability in PHP The Linear Congruential Generator (LCG) in PHP before 5.2.13 does not provide the expected entropy, which makes it easier for context-dependent attackers to guess values that were intended to be unpredictable, as demonstrated by session cookies generated by using the uniqid function. | 6.4 |
2009-12-24 | CVE-2009-4418 | Numeric Errors vulnerability in PHP The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences. | 5.0 |
2007-09-04 | CVE-2007-4658 | Unspecified vulnerability in PHP The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability. | 7.5 |
2007-07-16 | CVE-2007-3799 | Improper Input Validation vulnerability in PHP The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207. | 4.3 |
2007-03-21 | CVE-2007-1581 | Code Injection vulnerability in PHP The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources. | 9.3 |