Vulnerabilities > PHP > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-09-17 | CVE-2016-7416 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in PHP ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument. | 7.5 |
2016-09-17 | CVE-2016-7412 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in PHP ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata. | 8.1 |
2016-09-12 | CVE-2016-7133 | Integer Overflow or Wraparound vulnerability in PHP Zend/zend_alloc.c in PHP 7.x before 7.0.10, when open_basedir is enabled, mishandles huge realloc operations, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a long pathname. | 8.1 |
2016-09-12 | CVE-2016-7132 | NULL Pointer Dereference vulnerability in PHP ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing. | 7.5 |
2016-09-12 | CVE-2016-7131 | NULL Pointer Dereference vulnerability in PHP ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character. | 7.5 |
2016-09-12 | CVE-2016-7130 | NULL Pointer Dereference vulnerability in PHP The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document. | 7.5 |
2016-09-12 | CVE-2016-7125 | Injection vulnerability in PHP ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection. | 7.5 |
2016-08-07 | CVE-2016-5096 | Integer Overflow or Wraparound vulnerability in PHP Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument. | 8.6 |
2016-08-07 | CVE-2016-5095 | Integer Overflow or Wraparound vulnerability in PHP Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. | 8.6 |
2016-08-07 | CVE-2016-5094 | Integer Overflow or Wraparound vulnerability in PHP Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function. | 8.6 |