Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP prior to 5.5.36 and 5.6.x prior to 5.6.22 allows remote malicious users to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php 5.6.0 |
||
php php 5.6.1 |
||
php php 5.6.16 |
||
php php 5.6.17 |
||
php php 5.6.4 |
||
php php 5.6.5 |
||
php php 5.6.10 |
||
php php 5.6.11 |
||
php php 5.6.18 |
||
php php 5.6.19 |
||
php php 5.6.6 |
||
php php 5.6.7 |
||
php php 5.6.8 |
||
php php 5.6.14 |
||
php php 5.6.15 |
||
php php 5.6.21 |
||
php php 5.6.3 |
||
php php 5.6.12 |
||
php php 5.6.13 |
||
php php 5.6.2 |
||
php php 5.6.20 |
||
php php 5.6.9 |
||
php php |