CVE-2015-8617 in PHPinfo

Summary

Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Reservation

12/22/2015

Disclosure

01/19/2016

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you want to use VulDB in your project?

Use the official API to access entries easily!