- New writeup: a vulnerability in PHP's extract() function allows attackers to trigger a double-free, which in turn allows arbitrary code execution (native code) https://ssd-disclosure.com/ssd-advisory-extract-double-free5-x-use-after-free7-x-8-x/ 6 comments netsec
Would you like to stay up to date with PHP? Checkout PHP
Weekly.
Related searches:
Search whole site: site:ssd-disclosure.com
Search title: SSD Advisory - extract() double-free(5.X)/use-after-free(7.X/8.X) - SSD Secure Disclosure
See how to search.