Total vulnerabilities in the database
The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
Software | From | Fixed in |
---|---|---|
php / php | 5.2.9 | 5.2.9.x |
php / php | 5.2.4 | 5.2.4.x |
php / php | 5.1.5 | 5.1.5.x |
php / php | 5.1.2 | 5.1.2.x |
php / php | 5.1.1 | 5.1.1.x |
php / php | 5.0.0-beta1 | 5.0.0-beta1.x |
php / php | 5.1.6 | 5.1.6.x |
php / php | 5.0-rc1 | 5.0-rc1.x |
php / php | 5.2.7 | 5.2.7.x |
php / php | 5.2.2 | 5.2.2.x |
php / php | 5.0.5 | 5.0.5.x |
php / php | 5.0.1 | 5.0.1.x |
php / php | 5.1.4 | 5.1.4.x |
php / php | 5.2.5 | 5.2.5.x |
php / php | 5.0.4 | 5.0.4.x |
php / php | 5.0-rc3 | 5.0-rc3.x |
php / php | 5.2.11 | 5.2.11.x |
php / php | 5.2.6 | 5.2.6.x |
php / php | 5.0.0-rc2 | 5.0.0-rc2.x |
php / php | 5.2.3 | 5.2.3.x |
php / php | 5.0.3 | 5.0.3.x |
php / php | 5.1.0 | 5.1.0.x |
php / php | 5.0.0-rc3 | 5.0.0-rc3.x |
php / php | 5.2.0 | 5.2.0.x |
php / php | 5.0-rc2 | 5.0-rc2.x |
php / php | 5.0.0-beta3 | 5.0.0-beta3.x |
php / php | 5.1.3 | 5.1.3.x |
php / php | 5.2.10 | 5.2.10.x |
php / php | 5.0.0-rc1 | 5.0.0-rc1.x |
php / php | 5.0.2 | 5.0.2.x |
php / php | 5.2.1 | 5.2.1.x |
php / php | 5.0.0-beta4 | 5.0.0-beta4.x |
php / php | 5 | 5.x |
php / php | 5.0.0 | 5.0.0.x |
php / php | 5.0.0-beta2 | 5.0.0-beta2.x |
php / php | 5.2.8 | 5.2.8.x |
php / php | - | 5.3.0.x |