Page 14 of 301 results (0.014 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object. ext/standard/var_unserializer.re en PHP en versiones anteriores a 5.6.26 no maneja correctamente los fallos de deserialización de objeto, lo que podría permitir a atacantes remotos provocar una denegación de servicio (corrupción de memoria) o tener otro posible impacto no especificado a través de una llamada no serializada que referencia a un objeto construido parcialmente. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.securityfocus.com/bid/93009 http://www.securitytracker.com/id/1036836 https://bugs.php.net/bug.php?id=73052 https://github.com/php/php-src/commit/6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 https://security.gentoo.org/glsa/201611-22 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.1EPSS: 1%CPEs: 12EXPL: 1

ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata. ext/mysqlnd/mysqlnd_wireprotocol.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 no verifica que un campo BIT tenga el indicador UNSIGNED_FLAG, lo que podría permitir a servidores MySQL remotos provocar una denegación de servicio (desbordamiento de búfer basado en memoria dinámica) o tener otro posible impacto no especificado a través de metadatos de campo manipulado. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93005 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=72293 https://github.com/php/php-src/commit/28f80baf3c53e267c9ce46a2a0fadbb981585132?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 9.8EPSS: 1%CPEs: 12EXPL: 1

ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data. ext/spl/spl_array.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 procede con SplArray no serializado sin validar un valor de retorno y tipo de dato, lo que permite a atacantes remotos provocar una denegación de servicio o tener otro posible impacto no especificado a través de datos serializados manipulados. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93007 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=73029 https://github.com/php/php-src/commit/ecb7f58a069be0dec4a6131b6351a761f808f22e?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-20: Improper Input Validation CWE-252: Unchecked Return Value •

CVSS: 7.5EPSS: 2%CPEs: 12EXPL: 1

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call. La función php_wddx_push_element en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 permite a atacantes remotos provocar una denegación de servicio (acceso a puntero no válido y lectura fuera de límites) o tener otro posible impacto no especificado a través de un elemento booleano incorrecto en un documento XML wddxPacket, produciendo una manejo incorrecto en una llamada wddx_deserialize. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93011 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=73065 https://github.com/php/php-src/commit/c4cca4c20e75359c9a13a1f9a36cb7b4e9601d29?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 1%CPEs: 12EXPL: 1

Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call. Vulnerabilidad de uso después de liberación de memoria en la función wddx_stack_destroy en ext/wddx/wddx.c en PHP en versiones anteriores a 5.6.26 y 7.x en versiones anteriores a 7.0.11 permite a atacantes remotos provocar una denegación de servicio o tener otro posible impacto no especificado a través de un documento XML wddxPacket que carece de una etiqueta final para un elemento de campo de registro, produciendo una manejo incorrecto en una llamada wddx_deserialize. • http://www.openwall.com/lists/oss-security/2016/09/15/10 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/93006 http://www.securitytracker.com/id/1036836 https://access.redhat.com/errata/RHSA-2018:1296 https://bugs.php.net/bug.php?id=72860 https://github.com/php/php-src/commit/b88393f08a558eec14964a55d3c680fe67407712?w=1 https://security.gentoo.org/glsa/201611-22 https://www.tenable.com/security/tns-2016-19 • CWE-416: Use After Free •