Vulnerability Name:

CVE-2013-4635 (CCN-85161)

Assigned:2013-06-20
Published:2013-06-20
Updated:2013-09-12
Summary:Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2013-4635

Source: SUSE
Type: UNKNOWN
SUSE-SU-2013:1285

Source: SUSE
Type: UNKNOWN
SUSE-SU-2013:1315

Source: SUSE
Type: UNKNOWN
SUSE-SU-2013:1316

Source: SECUNIA
Type: UNKNOWN
54104

Source: VIM
Type: UNKNOWN
20130624 CVE-2013-4635 SndToJewish / SdnToJewish function name

Source: CCN
Type: PHP Web site
PHP 5 ChangeLog

Source: CONFIRM
Type: Vendor Advisory
http://www.php.net/ChangeLog-5.php

Source: CCN
Type: BID-60731
PHP Calendar Extension 'SndToJewish()' Remote Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1028699

Source: UBUNTU
Type: UNKNOWN
USN-1905-1

Source: CONFIRM
Type: UNKNOWN
https://bugs.php.net/bug.php?id=64895

Source: XF
Type: UNKNOWN
php-cve20134635-dos(85161)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-4635

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:1.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:2.0b10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.8:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.14:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.15:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.13:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.14:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.15:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.18:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.19:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.20:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.21:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.22:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.23:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.24:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.3.25)

  • Configuration 2:
  • cpe:/a:php:php:5.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.8:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.12:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.13:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.14:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.4.15:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:guriddo:form_php:5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20134635
    V
    CVE-2013-4635
    2022-05-20
    oval:org.opensuse.security:def:33049
    P
    Security update for java-1_7_0-openjdk (Important)
    2021-11-24
    oval:org.opensuse.security:def:32218
    P
    Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)
    2021-11-19
    oval:org.opensuse.security:def:26163
    P
    Security update for bind (Important)
    2021-11-11
    oval:org.opensuse.security:def:32162
    P
    Security update for libcares2 (Important)
    2021-08-16
    oval:org.opensuse.security:def:26099
    P
    Security update for libsndfile (Critical)
    2021-08-05
    oval:org.opensuse.security:def:26088
    P
    Security update for the Linux Kernel (Important)
    2021-07-14
    oval:org.opensuse.security:def:31638
    P
    Security update for caribou (Important)
    2021-06-10
    oval:org.opensuse.security:def:36538
    P
    php53-devel-5.3.17-0.41.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:42493
    P
    apache2-mod_php53-5.3.17-0.41.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36086
    P
    apache2-mod_php53-5.3.17-0.41.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26212
    P
    Security update for python3 (Moderate)
    2021-03-19
    oval:org.opensuse.security:def:32267
    P
    Security update for grub2 (Important)
    2021-03-02
    oval:org.opensuse.security:def:26087
    P
    Security update for sudo (Important)
    2021-01-26
    oval:org.opensuse.security:def:33010
    P
    Security update for java-1_8_0-ibm (Moderate)
    2021-01-05
    oval:org.opensuse.security:def:26061
    P
    Security update for dovecot22 (Important)
    2021-01-04
    oval:org.opensuse.security:def:25977
    P
    Security update for openssl-1_1 (Important)
    2020-12-10
    oval:org.opensuse.security:def:32006
    P
    Security update for mutt (Important)
    2020-12-07
    oval:org.opensuse.security:def:26291
    P
    Security update for python-reportlab (Important)
    2020-12-01
    oval:org.opensuse.security:def:27084
    P
    apache2-mod_php53 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25647
    P
    Security update for freetype2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:32328
    P
    Security update for samba (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26766
    P
    libsamplerate on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31862
    P
    Security update for curl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27049
    P
    unzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25636
    P
    Security update for libproxy (Important)
    2020-12-01
    oval:org.opensuse.security:def:32306
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26717
    P
    gzip on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31770
    P
    Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)
    2020-12-01
    oval:org.opensuse.security:def:27536
    P
    php53-devel on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26411
    P
    Security update for go (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25635
    P
    Security update for tigervnc (Critical)
    2020-12-01
    oval:org.opensuse.security:def:26664
    P
    aaa_base on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27501
    P
    libwmf on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26367
    P
    Security update for MozillaThunderbird (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26513
    P
    Security update for chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:25920
    P
    Security update for gstreamer-plugins-base (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31564
    P
    Security update for squid3 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26863
    P
    apache2-mod_jk on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26353
    P
    Security update for tor (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26429
    P
    Security update for keepalived (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25839
    P
    Security update for gimp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31553
    P
    Security update for sqlite3 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26819
    P
    ruby on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26314
    P
    Security update for iperf (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26372
    P
    Recommended update for geotiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25711
    P
    Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32372
    P
    Security update for tcpdump (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31552
    P
    Security update for socat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26805
    P
    perl-Tk on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26265
    P
    Security update for guile (Low)
    2020-12-01
    oval:org.opensuse.security:def:31919
    P
    Security update for ghostscript-library (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:25781
    P
    SUSE-SU-2013:1315-1 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:25802
    P
    SUSE-SU-2013:1317-1 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:25298
    P
    SUSE-SU-2013:1285-1 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:25866
    P
    SUSE-SU-2013:1285-2 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:25747
    P
    SUSE-SU-2013:1316-1 -- Security update for PHP5
    2014-09-08
    oval:org.mitre.oval:def:18424
    P
    USN-1905-1 -- php5 vulnerabilities
    2014-06-30
    oval:com.ubuntu.precise:def:20134635000
    V
    CVE-2013-4635 on Ubuntu 12.04 LTS (precise) - negligible.
    2013-06-21
    BACK
    php php 1.0
    php php 2.0
    php php 2.0b10
    php php 3.0
    php php 3.0.1
    php php 3.0.2
    php php 3.0.3
    php php 3.0.4
    php php 3.0.5
    php php 3.0.6
    php php 3.0.7
    php php 3.0.8
    php php 3.0.9
    php php 3.0.10
    php php 3.0.11
    php php 3.0.12
    php php 3.0.13
    php php 3.0.14
    php php 3.0.15
    php php 3.0.16
    php php 3.0.17
    php php 3.0.18
    php php 4.0 beta1
    php php 4.0 beta2
    php php 4.0 beta3
    php php 4.0 beta4
    php php 4.0 beta_4_patch1
    php php 4.0.0
    php php 4.0.1
    php php 4.0.2
    php php 4.0.3
    php php 4.0.4
    php php 4.0.5
    php php 4.0.6
    php php 4.0.7
    php php 4.1.0
    php php 4.1.1
    php php 4.1.2
    php php 4.2.0
    php php 4.2.1
    php php 4.2.2
    php php 4.2.3
    php php 4.3.0
    php php 4.3.1
    php php 4.3.2
    php php 4.3.3
    php php 4.3.4
    php php 4.3.5
    php php 4.3.6
    php php 4.3.7
    php php 4.3.8
    php php 4.3.9
    php php 4.3.10
    php php 4.3.11
    php php 4.4.0
    php php 4.4.1
    php php 4.4.2
    php php 4.4.3
    php php 4.4.4
    php php 4.4.5
    php php 4.4.6
    php php 4.4.7
    php php 4.4.8
    php php 4.4.9
    php php 5.0.0
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.0.2
    php php 5.0.3
    php php 5.0.4
    php php 5.0.5
    php php 5.1.0
    php php 5.1.1
    php php 5.1.2
    php php 5.1.3
    php php 5.1.4
    php php 5.1.5
    php php 5.1.6
    php php 5.2.0
    php php 5.2.1
    php php 5.2.2
    php php 5.2.3
    php php 5.2.4
    php php 5.2.5
    php php 5.2.6
    php php 5.2.7
    php php 5.2.8
    php php 5.2.9
    php php 5.2.10
    php php 5.2.11
    php php 5.2.12
    php php 5.2.13
    php php 5.2.14
    php php 5.2.15
    php php 5.2.16
    php php 5.2.17
    php php 5.3.0
    php php 5.3.1
    php php 5.3.2
    php php 5.3.3
    php php 5.3.4
    php php 5.3.5
    php php 5.3.6
    php php 5.3.7
    php php 5.3.8
    php php 5.3.9
    php php 5.3.10
    php php 5.3.11
    php php 5.3.12
    php php 5.3.13
    php php 5.3.14
    php php 5.3.15
    php php 5.3.16
    php php 5.3.17
    php php 5.3.18
    php php 5.3.19
    php php 5.3.20
    php php 5.3.21
    php php 5.3.22
    php php 5.3.23
    php php 5.3.24
    php php *
    php php 5.4.0
    php php 5.4.1
    php php 5.4.2
    php php 5.4.3
    php php 5.4.4
    php php 5.4.5
    php php 5.4.6
    php php 5.4.7
    php php 5.4.8
    php php 5.4.9
    php php 5.4.10
    php php 5.4.11
    php php 5.4.12
    php php 5.4.13
    php php 5.4.14
    php php 5.4.15
    php php 5.4.0
    guriddo form php 5.3