CVE-2014-2020
18.02.2014, 11:55
ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 𝑥 ≤ 5.5.8 |
php | php | 5.5.0:alpha1 |
php | php | 5.5.0:alpha2 |
php | php | 5.5.0:alpha3 |
php | php | 5.5.0:alpha4 |
php | php | 5.5.0:alpha5 |
php | php | 5.5.0:alpha6 |
php | php | 5.5.0:beta1 |
php | php | 5.5.0:beta2 |
php | php | 5.5.0:beta3 |
php | php | 5.5.0:beta4 |
php | php | 5.5.0:rc1 |
php | php | 5.5.0:rc2 |
php | php | 5.5.1 |
php | php | 5.5.2 |
php | php | 5.5.3 |
php | php | 5.5.4 |
php | php | 5.5.5 |
php | php | 5.5.6 |
php | php | 5.5.7 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References