Логотип exploitDog
product: "php"
Консоль
Логотип exploitDog

exploitDog

product: "php"

Количество 3 843

Количество 3 843

nvd логотип

CVE-2017-9227

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2017-9227

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2017-9226

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2017-9226

больше 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2017-9226

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2017-9226

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2017-9224

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2017-9224

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2017-9224

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2017-9224

около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2017-9120

около 7 лет назад

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2017-9120

больше 8 лет назад

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2017-9120

около 7 лет назад

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2017-9120

около 7 лет назад

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of ser ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2017-9118

около 7 лет назад

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2017-9118

больше 8 лет назад

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2017-9118

около 7 лет назад

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-9118

около 7 лет назад

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a c ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-9067

больше 8 лет назад

In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2017-5340

больше 8 лет назад

Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-9227

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.

CVSS3: 9.8
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-9227

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
0%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2017-9226

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 9.8
1%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-9226

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 4.8
1%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-9226

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 9.8
1%
Низкий
около 8 лет назад
debian логотип
CVE-2017-9226

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
1%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2017-9224

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 9.8
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-9224

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 4.8
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-9224

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.

CVSS3: 9.8
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-9224

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
0%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2017-9120

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 9.8
9%
Низкий
около 7 лет назад
redhat логотип
CVE-2017-9120

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 5.3
9%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-9120

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.

CVSS3: 9.8
9%
Низкий
около 7 лет назад
debian логотип
CVE-2017-9120

PHP 7.x through 7.1.5 allows remote attackers to cause a denial of ser ...

CVSS3: 9.8
9%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2017-9118

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 7.5
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2017-9118

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 5.3
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-9118

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.

CVSS3: 7.5
0%
Низкий
около 7 лет назад
debian логотип
CVE-2017-9118

PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a c ...

CVSS3: 7.5
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2017-9067

In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.

CVSS3: 7
0%
Низкий
больше 8 лет назад
ubuntu логотип
CVE-2017-5340

Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.

CVSS3: 9.8
11%
Средний
больше 8 лет назад

Уязвимостей на страницу