PHP 5.2.5 and Prior Versions Multiple Vulnerabilities

Exploiting some of these issues depends on the configuration of the application employing the vulnerable PHP version. To exploit some of these issues, an attacker must have local access; for other issues, the attacker can use a browser.


 

Privacy Statement
Copyright 2010, SecurityFocus