Total vulnerabilities in the database
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
Software | From | Fixed in |
---|---|---|
php / php | 7.0.0 | 7.0.0.x |
php / php | 7.0.0-alpha1 | 7.0.0-alpha1.x |
php / php | 7.0.0-alpha2 | 7.0.0-alpha2.x |
php / php | 7.0.0-beta1 | 7.0.0-beta1.x |
php / php | 7.0.0-beta2 | 7.0.0-beta2.x |
php / php | 7.0.0-beta3 | 7.0.0-beta3.x |
php / php | 7.0.0-rc1 | 7.0.0-rc1.x |
php / php | 7.0.0-rc2 | 7.0.0-rc2.x |
php / php | 7.0.0-rc3 | 7.0.0-rc3.x |
php / php | 7.0.0-rc4 | 7.0.0-rc4.x |
php / php | 7.0.0-rc5 | 7.0.0-rc5.x |
php / php | 7.0.0-rc6 | 7.0.0-rc6.x |
php / php | 7.0.0-rc7 | 7.0.0-rc7.x |
php / php | 7.0.0-rc8 | 7.0.0-rc8.x |