Vulnerabilities > PHP > PHP > 5.2.14

DATE CVE VULNERABILITY TITLE RISK
2011-03-16 CVE-2011-1153 USE of Externally-Controlled Format String vulnerability in PHP
Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.
network
low complexity
php CWE-134
7.5
2011-03-15 CVE-2011-1092 Numeric Errors vulnerability in PHP
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
network
low complexity
php CWE-189
7.5
2011-02-02 CVE-2011-0755 Numeric Errors vulnerability in PHP
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
network
low complexity
php CWE-189
5.0
2011-02-02 CVE-2011-0754 Link Following vulnerability in PHP
The SplFileInfo::getType function in the Standard PHP Library (SPL) extension in PHP before 5.3.4 on Windows does not properly detect symbolic links, which might make it easier for local users to conduct symlink attacks by leveraging cross-platform differences in the stat structure, related to lack of a FILE_ATTRIBUTE_REPARSE_POINT check.
4.4
2011-02-02 CVE-2011-0753 Race Condition vulnerability in PHP
Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.
network
php CWE-362
4.3
2011-02-02 CVE-2011-0752 Improper Input Validation vulnerability in PHP
The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758.
network
low complexity
php CWE-20
5.0
2011-01-18 CVE-2010-4699 Numeric Errors vulnerability in PHP
The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set.
network
low complexity
php CWE-189
5.0
2011-01-18 CVE-2010-4698 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in PHP
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
network
low complexity
php CWE-119
5.0
2011-01-18 CVE-2010-4697 Resource Management Errors vulnerability in PHP
Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference.
network
php CWE-399
6.8
2011-01-18 CVE-2006-7243 Improper Input Validation vulnerability in PHP
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
network
low complexity
php CWE-20
5.0