Total vulnerabilities in the database
The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
Software | From | Fixed in |
---|---|---|
php / php | 5.2.9 | 5.2.9.x |
php / php | 5.1.5 | 5.1.5.x |
php / php | 5.3.6 | 5.3.6.x |
php / php | 5.3.9 | 5.3.9.x |
php / php | 5.1.2 | 5.1.2.x |
php / php | 5.3.1 | 5.3.1.x |
php / php | 5.1.1 | 5.1.1.x |
php / php | 5.2.14 | 5.2.14.x |
php / php | 5.0.0-beta1 | 5.0.0-beta1.x |
php / php | 5.1.6 | 5.1.6.x |
php / php | 5.2.16 | 5.2.16.x |
php / php | 5.3.8 | 5.3.8.x |
php / php | 5.2.7 | 5.2.7.x |
php / php | 5.2.2 | 5.2.2.x |
php / php | 5.0.5 | 5.0.5.x |
php / php | 5.0.1 | 5.0.1.x |
php / php | 5.1.4 | 5.1.4.x |
php / php | 5.2.5 | 5.2.5.x |
php / php | 5.0.4 | 5.0.4.x |
php / php | 5.2.12 | 5.2.12.x |
php / php | - | 5.3.10.x |
php / php | 5.2.11 | 5.2.11.x |
php / php | 5.2.6 | 5.2.6.x |
php / php | 5.2.17 | 5.2.17.x |
php / php | 5.3.0 | 5.3.0.x |
php / php | 5.0.0-rc2 | 5.0.0-rc2.x |
php / php | 5.2.3 | 5.2.3.x |
php / php | 5.3.3 | 5.3.3.x |
php / php | 5.0.3 | 5.0.3.x |
php / php | 5.3.7 | 5.3.7.x |
php / php | 5.1.0 | 5.1.0.x |
php / php | 5.2.13 | 5.2.13.x |
php / php | 5.0.0-rc3 | 5.0.0-rc3.x |
php / php | 5.2.0 | 5.2.0.x |
php / php | 5.2.4 | 5.2.4.x |
php / php | 5.0.0-beta3 | 5.0.0-beta3.x |
php / php | 5.3.2 | 5.3.2.x |
php / php | 5.3.4 | 5.3.4.x |
php / php | 5.1.3 | 5.1.3.x |
php / php | 5.2.10 | 5.2.10.x |
php / php | 5.0.0-rc1 | 5.0.0-rc1.x |
php / php | 5.0.2 | 5.0.2.x |
php / php | 5.2.15 | 5.2.15.x |
php / php | 5.3.5 | 5.3.5.x |
php / php | 5.2.1 | 5.2.1.x |
php / php | 5.0.0-beta4 | 5.0.0-beta4.x |
php / php | 5.0.0 | 5.0.0.x |
php / php | 5.0.0-beta2 | 5.0.0-beta2.x |
php / php | 5.2.8 | 5.2.8.x |