Search Results (Refine Search)
- CPE Product Version: cpe:/a:php:php:5.3.11
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2012-3365 |
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors. Published: July 20, 2012; 6:40:37 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2012-2688 |
Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow." Published: July 20, 2012; 6:40:36 AM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2012-2386 |
Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow. Published: July 07, 2012; 6:21:13 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2012-2143 |
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password. Published: July 05, 2012; 10:55:02 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2012-2376 |
Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012. Published: May 21, 2012; 11:55:02 AM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2012-2336 |
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. Published: May 11, 2012; 6:15:48 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2012-2311 |
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. Published: May 11, 2012; 6:15:48 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2012-1823 |
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. Published: May 11, 2012; 6:15:48 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |