The unserialize function in PHP 5.3.0 and previous versions allows context-dependent malicious users to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php 5.2.11 |
||
php php 5.2.7 |
||
php php 5.2.9 |
||
php php 5.1.2 |
||
php php 5.0.0 |
||
php php 5.0.2 |
||
php php 5.2.4 |
||
php php 5.2.3 |
||
php php 5.0 |
||
php php 5.1.1 |
||
php php 5.2.1 |
||
php php 5.2.2 |
||
php php 5 |
||
php php 5.2.10 |
||
php php 5.2.6 |
||
php php 5.2.8 |
||
php php 5.1.0 |
||
php php 5.0.5 |
||
php php 5.0.4 |
||
php php 5.1.6 |
||
php php 5.2.0 |
||
php php 5.2.5 |
||
php php 5.0.3 |
||
php php 5.1.3 |
||
php php 5.0.1 |
||
php php 5.1.4 |
||
php php 5.1.5 |
||
php php |