Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 5.3.2 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2010-4700
The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent malicious users to conduct SQL injection attacks via crafted i...
Php Php 5.3.2
Php Php 5.3.3
5
CVSSv2
CVE-2010-3062
mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 up to and including 5.3.2 allows remote malicious users to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overf...
Php Php 5.3.0
Php Php 5.3.1
Php Php 5.3.2
5
CVSSv2
CVE-2010-3063
The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 up to and including 5.3.2 does not properly calculate a buffer length, which allows context-dependent malicious users to trigger a heap-based buffer overflow via crafted inputs that cause a negative...
Php Php 5.3.0
Php Php 5.3.1
Php Php 5.3.2
6.8
CVSSv2
CVE-2010-3064
Stack-based buffer overflow in the php_mysqlnd_auth_write function in the Mysqlnd extension in PHP 5.3 up to and including 5.3.2 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) username or (2) databa...
Php Php 5.3.0
Php Php 5.3.1
Php Php 5.3.2
6.8
CVSSv2
CVE-2010-2950
Format string vulnerability in stream.c in the phar extension in PHP 5.3.x up to and including 5.3.3 allows context-dependent malicious users to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handl...
Php Php 5.3.1
Php Php 5.3.2
Php Php 5.3.0
Php Php 5.3.3
4.3
CVSSv2
CVE-2011-1398
The sapi_header_op function in main/SAPI.c in PHP prior to 5.3.11 and 5.4.x prior to 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote malicious users to bypass an HTTP response-splitting protection mechanism via a crafted URL, relate...
Php Php 5.3.7
Php Php 5.3.6
Php Php 5.3.5
Php Php 5.3.9
Php Php 5.3.8
Php Php 5.3.0
Php Php
Php Php 5.3.2
Php Php 5.3.1
Php Php 5.3.4
Php Php 5.3.3
1 EDB exploit
5
CVSSv2
CVE-2010-4150
Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 prior to 5.2.15 and 5.3 prior to 5.3.4 allows malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
Php Php 5.2.4
Php Php 5.2.3
Php Php 5.3.2
Php Php 5.2.11
Php Php 5.2.0
Php Php 5.3.0
Php Php 5.3.1
Php Php 5.2.12
Php Php 5.2.10
Php Php 5.2.13
Php Php 5.2.2
Php Php 5.3.3
Php Php 5.2.14
Php Php 5.2.1
5
CVSSv2
CVE-2010-4698
Stack-based buffer overflow in the GD extension in PHP prior to 5.2.15 and 5.3.x prior to 5.3.4 allows context-dependent malicious users to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
Php Php 5.2.12
Php Php 5.2.10
Php Php 5.2.1
Php Php 5.2.2
Php Php 5.2.0
Php Php 5.2.4
Php Php 5.3.1
Php Php 5.3.2
Php Php 5.2.3
Php Php 5.2.14
Php Php 5.2.13
Php Php 5.2.11
Php Php 5.3.3
Php Php 5.3.0
5
CVSSv2
CVE-2010-1860
The html_entity_decode function in PHP 5.2 up to and including 5.2.13 and 5.3 up to and including 5.3.2 allows context-dependent malicious users to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call,...
Php Php 5.2.6
Php Php 5.2.8
Php Php 5.2.2
Php Php 5.2.3
Php Php 5.2.11
Php Php 5.2.12
Php Php 5.2.13
Php Php 5.2.4
Php Php 5.2.5
Php Php 5.2.0
Php Php 5.2.1
Php Php 5.2.9
Php Php 5.2.10
Php Php 5.3.1
Php Php 5.3.2
Php Php 5.3.0
7.5
CVSSv2
CVE-2010-1868
The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 up to and including 5.2.13 and 5.3 up to and including 5.3.2 allow context-dependent malicious users to execute arbitrary code by calling these functions with an empty SQL query, wh...
Php Php 5.2.5
Php Php 5.2.8
Php Php 5.2.13
Php Php 5.2.0
Php Php 5.2.1
Php Php 5.2.2
Php Php 5.2.3
Php Php 5.2.9
Php Php 5.2.10
Php Php 5.2.11
Php Php 5.2.12
Php Php 5.2.4
Php Php 5.2.6
Php Php 5.3.0
Php Php 5.3.2
Php Php 5.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »