Total vulnerabilities in the database
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Software | From | Fixed in |
---|---|---|
phpunit_project / phpunit | - | 4.8.27.x |
phpunit_project / phpunit | 5.0.0 | 5.6.3 |
oracle / communications_diameter_signaling_router | 8.0.0 | 8.5.0.x |
![]() |
4.8.19 | 4.8.28 |
![]() |
5.0.0 | 5.6.3 |