Show filters
77 Total Results
Displaying 41-50 of 77
Sort by:
Attacker Value
Unknown
CVE-2010-4697
Disclosure Date: January 18, 2011 (last updated October 04, 2023)
Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference.
0
Attacker Value
Unknown
CVE-2010-4698
Disclosure Date: January 18, 2011 (last updated October 04, 2023)
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
0
Attacker Value
Unknown
CVE-2006-7243
Disclosure Date: January 18, 2011 (last updated October 04, 2023)
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
0
Attacker Value
Unknown
CVE-2010-4699
Disclosure Date: January 18, 2011 (last updated October 04, 2023)
The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set.
0
Attacker Value
Unknown
CVE-2010-4645
Disclosure Date: January 11, 2011 (last updated October 04, 2023)
strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
0
Attacker Value
Unknown
CVE-2010-4150
Disclosure Date: December 07, 2010 (last updated October 04, 2023)
Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2010-4409
Disclosure Date: December 06, 2010 (last updated October 04, 2023)
Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
0
Attacker Value
Unknown
CVE-2010-3710
Disclosure Date: October 25, 2010 (last updated October 04, 2023)
Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
0
Attacker Value
Unknown
CVE-2010-2950
Disclosure Date: September 28, 2010 (last updated October 04, 2023)
Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
0
Attacker Value
Unknown
CVE-2010-3063
Disclosure Date: August 20, 2010 (last updated October 04, 2023)
The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.
0