Vulnerabilities > PHP > PHP > 5.2.3

DATE CVE VULNERABILITY TITLE RISK
2007-07-27 CVE-2007-4033 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.
network
low complexity
php t1lib CWE-119
7.5
2007-07-26 CVE-2007-4010 Unspecified vulnerability in PHP 5.2.3
The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.
network
php
6.8
2007-07-17 CVE-2007-3806 Improper Input Validation vulnerability in PHP 5.2.3
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
network
php CWE-20
6.8
2007-07-16 CVE-2007-3799 Improper Input Validation vulnerability in PHP
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
network
php CWE-20
4.3
2007-07-15 CVE-2007-3790 Denial-Of-Service vulnerability in PHP 5.2.3
The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.
network
php
5.8
2007-06-29 CVE-2007-3378 Permissions, Privileges, and Access Controls vulnerability in PHP
The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.
network
php CWE-264
6.8
2007-06-20 CVE-2007-3294 Buffer Errors vulnerability in PHP 5.2.3
Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function.
network
low complexity
php CWE-119
7.5
2007-03-21 CVE-2007-1581 Code Injection vulnerability in PHP
The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources.
network
php CWE-94
critical
9.3
2007-03-12 CVE-2007-1413 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in PHP
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
network
low complexity
php CWE-119
7.5