Количество 11
Количество 11

CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a sta ...
GHSA-v28p-49px-6723
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.

BDU:2022-02421
Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код

openSUSE-SU-2017:2366-1
Security update for php5

openSUSE-SU-2017:2337-1
Security update for php7

SUSE-SU-2017:2317-1
Security update for php5

SUSE-SU-2017:2303-1
Security update for php7

SUSE-SU-2017:2522-1
Security update for php53
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2017-11628 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-11628 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives. | CVSS3: 4 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-11628 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
CVE-2017-11628 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a sta ... | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
GHSA-v28p-49px-6723 In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-02421 Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код | CVSS3: 8.8 | 0% Низкий | почти 8 лет назад |
![]() | openSUSE-SU-2017:2366-1 Security update for php5 | почти 8 лет назад | ||
![]() | openSUSE-SU-2017:2337-1 Security update for php7 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2317-1 Security update for php5 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2303-1 Security update for php7 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2522-1 Security update for php53 | почти 8 лет назад |
Уязвимостей на страницу