7.5
CVSSv3

CVE-2016-10162

Published: 24/01/2017 Updated: 04/05/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x prior to 7.0.15 and 7.1.x prior to 7.1.1 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 7.0.11

php php 7.0.12

php php 7.0.13

php php 7.0.7

php php 7.0.8

php php 7.0.0

php php 7.0.3

php php 7.0.4

php php 7.0.1

php php 7.0.10

php php 7.0.5

php php 7.0.6

php php 7.0.14

php php 7.0.2

php php 7.0.9

php php 7.1.0

Vendor Advisories

Synopsis Moderate: rh-php70-php security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php70-php is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabilit ...
USN-3211-1 introduced a regression in PHP ...
Several security issues were fixed in PHP ...
Integer overflow in gd_ioc in the GD Graphics Library (aka libgd) before 224 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image (CVE-2016-10168) In all versions of PHP 7, during the unserialization process, resizing the 'properties'; hash table of a serialized object ...
The php_wddx_pop_element function in ext/wddx/wddxc in PHP 70x before 7015 and 71x before 711 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call ...