Php

Php

711 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.58%
  • Veröffentlicht 17.07.2017 13:18:21
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have...

  • EPSS 0.4%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.c...

  • EPSS 50.03%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.

  • EPSS 11.86%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wdd...

  • EPSS 41.63%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation c...

  • EPSS 8.27%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/p...

Exploit
  • EPSS 2.86%
  • Veröffentlicht 10.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile fu...

Exploit
  • EPSS 23.89%
  • Veröffentlicht 08.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of vali...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Co...