Php

Php

711 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.58%
  • Published 17.07.2017 13:18:21
  • Last modified 20.04.2025 01:37:25

In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have...

  • EPSS 0.4%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.c...

  • EPSS 50.03%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.

  • EPSS 11.86%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wdd...

  • EPSS 41.63%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation c...

  • EPSS 8.27%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/p...

Exploit
  • EPSS 2.86%
  • Published 10.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile fu...

Exploit
  • EPSS 23.89%
  • Published 08.06.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.

Exploit
  • EPSS 0.6%
  • Published 24.05.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of vali...

Exploit
  • EPSS 0.39%
  • Published 24.05.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Co...