
CVE-2010-4700
https://notcve.org/view.php?id=CVE-2010-4700
18 Jan 2011 — The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions. La función set_magic_quotes_runtime en PHP v5.3.2 y v5.3.3, cuando se utiliza la extensión MySQLi, no interactúa correctamente con la función mysqli_fetch_assoc, lo que podría h... • http://bugs.php.net/52221 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2010-4698
https://notcve.org/view.php?id=CVE-2010-4698
18 Jan 2011 — Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. Desbordamiento de búfer basado en pila en la extensión GD en PHP en versiones anteriores a 5.2.15 y 5.3.x en versiones anteriores a 5.3.4 permite a atacantes dependientes del contexto provocar una denegación de servicio (caída de la aplicación) a tra... • http://bugs.php.net/53492 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2010-4699
https://notcve.org/view.php?id=CVE-2010-4699
18 Jan 2011 — The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set. La función iconv_mime_decode_headers en la extensión Iconv para P... • http://bugs.php.net/52941 • CWE-189: Numeric Errors •

CVE-2010-4697
https://notcve.org/view.php?id=CVE-2010-4697
18 Jan 2011 — Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference. Vulnerabilidad uso después de liberación en el motor de Zend en PHP anterior a v5.2.15 y v5.3.x antes de v5.3.4 podría permitir a atacantes dependientes de contexto provocar una denega... • http://bugs.php.net/52879 • CWE-399: Resource Management Errors •

CVE-2006-7243 – php: paths with NULL character were considered valid
https://notcve.org/view.php?id=CVE-2006-7243
18 Jan 2011 — PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function. PHP anterior a v5.3.4 acepta el caracter \0 en un nombre de ruta, lo que podría permitir a atacantes dependientes de contexto eludir las restricciones de acceso colocando una extensión de archivo después de este caracter, como se... • http://bugs.php.net/39863 • CWE-20: Improper Input Validation CWE-626: Null Byte Interaction Error (Poison Null Byte) •

CVE-2010-4645 – PHP 5.3.2 - 'zend_strtod()' Floating-Point Value Denial of Service
https://notcve.org/view.php?id=CVE-2010-4645
11 Jan 2011 — strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308. strtod.c, tal como se utiliza en la función zend_strtod en PHP v5.2 anterior de v5.2.17 y v5.3 anterior de v5.3.5, y otros productos, permite a atacantes dependi... • https://www.exploit-db.com/exploits/35164 • CWE-189: Numeric Errors •

CVE-2010-4150
https://notcve.org/view.php?id=CVE-2010-4150
07 Dec 2010 — Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors. Doble vulnerabilidad en la función imap_do_open en la extensión IMAP (ext/IMAP/php_imap.c) en PHP v5.2 antes de v5.2.15 y v5.3 antes de v5.3.4 permite a atacantes provocar una denegación de servicio (por corrupción de memoria) o posiblemente... • http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html • CWE-399: Resource Management Errors •

CVE-2010-4409 – PHP 5.3.3 - NumberFormatter::getSymbol Integer Overflow
https://notcve.org/view.php?id=CVE-2010-4409
06 Dec 2010 — Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument. Desbordamienteo de entero en la función NumberFormatter::getSymbol (numfmt_get_symbol) de PHP 5.3.3 y versiones anteriores. Permite a atacantes dependiendo del contexto provocar una denegación de servicio (caída de la aplicación) a través de un argumento inválido. • https://www.exploit-db.com/exploits/15722 • CWE-189: Numeric Errors •

CVE-2010-3870 – PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation
https://notcve.org/view.php?id=CVE-2010-3870
12 Nov 2010 — The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string. La función utf8_decode en PHP anterior v5.3.4 no maneja adecuadamente la codificación UTF-8 corta y las secuencias malformadas en los datos UTF-8, lo que hace fácil para los atacantes remotos superar los mecanismos de protec... • https://www.exploit-db.com/exploits/34950 • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2010-4156 – PHP 5.3.x - 'mb_strcut()' Information Disclosure
https://notcve.org/view.php?id=CVE-2010-4156
10 Nov 2010 — The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x through 5.3.3, allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter). La función mb_strcut en Libmbfl v1.1.0, como el usado en PHP v5.3.x hasta v5.3.3, permite a atacantes dependientes del contexto obtener información potencialmente sensible a través de un valor largo del tercer parámetro (también conocido como parametro length. • https://www.exploit-db.com/exploits/34979 • CWE-20: Improper Input Validation •