Vulnerabilities > PHP > PHP > 5.3.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-01-18 | CVE-2010-4698 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in PHP Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. | 5.0 |
2011-01-18 | CVE-2010-4697 | Resource Management Errors vulnerability in PHP Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference. | 6.8 |
2011-01-18 | CVE-2006-7243 | Improper Input Validation vulnerability in PHP PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. | 5.0 |
2010-12-07 | CVE-2010-4150 | Resource Management Errors vulnerability in PHP Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors. | 5.0 |
2010-12-06 | CVE-2010-4409 | Numeric Errors vulnerability in PHP Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument. | 5.0 |
2010-11-10 | CVE-2010-4156 | Improper Input Validation vulnerability in Scottmac Libmbfl 1.1.0 The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x through 5.3.3, allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter). | 5.0 |
2010-11-09 | CVE-2010-3436 | Permissions, Privileges, and Access Controls vulnerability in multiple products fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename. | 5.0 |
2010-10-25 | CVE-2010-3710 | Resource Management Errors vulnerability in PHP Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string. | 4.3 |
2010-09-28 | CVE-2010-2950 | USE of Externally-Controlled Format String vulnerability in PHP Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. | 6.8 |
2010-08-20 | CVE-2010-3065 | Permissions, Privileges, and Access Controls vulnerability in PHP The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name. | 5.0 |