
CVE-2011-1153
https://notcve.org/view.php?id=CVE-2011-1153
16 Mar 2011 — Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call. Múltiples vulnerabilidades de formato de cadena en phar_object.c en la extensión phar en PHP v5.3.5 y anteriores, permite a... • http://bugs.php.net/bug.php?id=54247 • CWE-134: Use of Externally-Controlled Format String •

CVE-2011-1092 – PHP 5.3.6 - 'shmop_read()' Integer Overflow Denial of Service
https://notcve.org/view.php?id=CVE-2011-1092
15 Mar 2011 — Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function. Desbordamiento de entero en ext/shmop/shmop.c en PHP antes de v5.3.6, permite a usuarios locales o remotos provocar una denegación de servicio (caida) y posiblemente leer información sensible de la memoria a través de largos argumentos en la funcion shmop_read • https://www.exploit-db.com/exploits/16966 • CWE-189: Numeric Errors •

CVE-2011-0420 – PHP 5.3.5 - 'grapheme_extract()' Null Pointer Dereference
https://notcve.org/view.php?id=CVE-2011-0420
18 Feb 2011 — The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference. La función grapheme_extract en la extensión de Internacionalización (Intl) para ICU para PHP v5.3.5 permite provocar una denegación de servicio (con caída de la aplicación) a atacantes dependientes del contexto a través de un argumento de tamaño no válido, lo que provoc... • https://www.exploit-db.com/exploits/16182 •

CVE-2011-0755
https://notcve.org/view.php?id=CVE-2011-0755
02 Feb 2011 — Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax. Desbordamiento de entero en la función mt_rand en PHP anteriores a v5.3.4 podría facilitar a atacantes dependiendo del contexto predecir los valores que devuelve, aprovechando el uso de un script de un parámetro max grande, como lo demuestra un valor que exce... • http://bugs.php.net/46587 • CWE-189: Numeric Errors •

CVE-2011-0752
https://notcve.org/view.php?id=CVE-2011-0752
02 Feb 2011 — The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758. La función Extract en PHP anteriores a v5.2.15 no previenen la utilización del parámetro EXTR_OVERWRITE para sobreescribir (1) la ... • http://marc.info/?l=bugtraq&m=133469208622507&w=2 • CWE-20: Improper Input Validation •

CVE-2011-0754
https://notcve.org/view.php?id=CVE-2011-0754
02 Feb 2011 — The SplFileInfo::getType function in the Standard PHP Library (SPL) extension in PHP before 5.3.4 on Windows does not properly detect symbolic links, which might make it easier for local users to conduct symlink attacks by leveraging cross-platform differences in the stat structure, related to lack of a FILE_ATTRIBUTE_REPARSE_POINT check. La función SplFileInfo::getType PHP Library (SPL) en la extensión en PHP anterior a v5.3.4 en Windows no detecta correctamente los enlaces simbólicos, lo que podría facili... • http://bugs.php.net/51763 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2011-0753
https://notcve.org/view.php?id=CVE-2011-0753
02 Feb 2011 — Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals. Condición de carrera en la extensión PCNTL en PHP anteriores a 5.3.4, cuando existe un gestor de señal definido por el usuario, podría permitir a atacantes dependiendo del contexto provocar una denegación de servicio (corrupción de memoria) a través de un número de señales muy g... • http://bugs.php.net/52784 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2010-4700
https://notcve.org/view.php?id=CVE-2010-4700
18 Jan 2011 — The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions. La función set_magic_quotes_runtime en PHP v5.3.2 y v5.3.3, cuando se utiliza la extensión MySQLi, no interactúa correctamente con la función mysqli_fetch_assoc, lo que podría h... • http://bugs.php.net/52221 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2010-4698
https://notcve.org/view.php?id=CVE-2010-4698
18 Jan 2011 — Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. Desbordamiento de búfer basado en pila en la extensión GD en PHP en versiones anteriores a 5.2.15 y 5.3.x en versiones anteriores a 5.3.4 permite a atacantes dependientes del contexto provocar una denegación de servicio (caída de la aplicación) a tra... • http://bugs.php.net/53492 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2010-4699
https://notcve.org/view.php?id=CVE-2010-4699
18 Jan 2011 — The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set. La función iconv_mime_decode_headers en la extensión Iconv para P... • http://bugs.php.net/52941 • CWE-189: Numeric Errors •