Php

Php

711 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.96%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger th...

Exploit
  • EPSS 0.48%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in for...

Exploit
  • EPSS 0.88%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variab...

Exploit
  • EPSS 0.54%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 21.05.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data struc...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 18.05.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.

Exploit
  • EPSS 4.59%
  • Veröffentlicht 12.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have un...

Exploit
  • EPSS 20.96%
  • Veröffentlicht 21.04.2017 20:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.

  • EPSS 0.51%
  • Veröffentlicht 19.04.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "Ther...

  • EPSS 0.36%
  • Veröffentlicht 03.04.2017 05:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The _zval_get_long_func_ex in Zend/zend_operators.c in PHP 7.1.2 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted use of "declare(ticks=" in a PHP script. NOTE: the vendor disputes the classif...