Vulnerabilities > PHP > PHP > 5.6.7
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-06-09 | CVE-2015-2783 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in PHP ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions. | 5.8 |
2015-04-24 | CVE-2015-3416 | Integer Overflow or Wraparound vulnerability in multiple products The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. | 7.5 |
2015-04-24 | CVE-2015-3415 | Improper Resource Shutdown or Release vulnerability in multiple products The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. | 7.5 |
2015-04-24 | CVE-2015-3414 | Use of Uninitialized Resource vulnerability in multiple products SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. | 7.5 |
2015-03-30 | CVE-2013-6501 | Injection vulnerability in PHP The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c. | 4.6 |