CVE-2015-6527
19.01.2016, 05:59
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 7.0.0 |
php | php | 7.0.0:alpha1 |
php | php | 7.0.0:alpha2 |
php | php | 7.0.0:beta1 |
php | php | 7.0.0:beta2 |
php | php | 7.0.0:beta3 |
php | php | 7.0.0:rc1 |
php | php | 7.0.0:rc2 |
php | php | 7.0.0:rc3 |
php | php | 7.0.0:rc4 |
php | php | 7.0.0:rc5 |
php | php | 7.0.0:rc6 |
php | php | 7.0.0:rc7 |
php | php | 7.0.0:rc8 |
𝑥
= Vulnerable software versions
References