Количество 8
Количество 8
GHSA-2q66-g93m-c6wv
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.

CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.

CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.

CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of b ...

BDU:2022-02419
Уязвимость функции wddx_deserialize() интерпретатора языка программирования PHP , связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2017:2366-1
Security update for php5

SUSE-SU-2017:2317-1
Security update for php5
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-2q66-g93m-c6wv In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | CVSS3: 7.5 | 5% Низкий | около 3 лет назад | |
![]() | CVE-2017-11143 In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | CVSS3: 7.5 | 5% Низкий | почти 8 лет назад |
![]() | CVE-2017-11143 In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | CVSS3: 5.9 | 5% Низкий | больше 8 лет назад |
![]() | CVE-2017-11143 In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | CVSS3: 7.5 | 5% Низкий | почти 8 лет назад |
CVE-2017-11143 In PHP before 5.6.31, an invalid free in the WDDX deserialization of b ... | CVSS3: 7.5 | 5% Низкий | почти 8 лет назад | |
![]() | BDU:2022-02419 Уязвимость функции wddx_deserialize() интерпретатора языка программирования PHP , связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 5% Низкий | почти 8 лет назад |
![]() | openSUSE-SU-2017:2366-1 Security update for php5 | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2317-1 Security update for php5 | почти 8 лет назад |
Уязвимостей на страницу