[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-15017":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":54,"name":55,"published":56,"updated":34},15017,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":44,"epss_score":45,"epss_percentile":46,"cve":47,"in_cisa_catalog":52,"date":53,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"high","The following flaws exist: - CVE-2018-10549: Out of bounds read error in exif_read_data function while processing crafted JPG data. - CVE-2018-10546: An error in stream filter convert.iconv which leads to infinite loop on invalid sequence. - CVE-2018-10548: An error in the LDAP module of PHP which allows a malicious LDAP server or man-in-the-middle attacker to crash PHP. - CVE-2018-10547: An error in the phar_do_404() function in ext/phar/phar_object.c script which returns parts of the request unfiltered, leading to another XSS vector. This is due to incomplete fix for CVE-2018-5712. Successful exploitation will allow an attacker to conduct XSS attacks, crash PHP, conduct denial of service condition and execute arbitrary code in the context of the affected application.","PHP is prone to multiple vulnerabilities.","Update to version 5.6.36, 7.0.30, 7.1.17, 7.2.5 or later.",[40,41,42,43],"http://www.php.net/ChangeLog-5.php#5.6.36","http://www.php.net/ChangeLog-7.php#7.0.30","http://www.php.net/ChangeLog-7.php#7.1.17","http://www.php.net/ChangeLog-7.php#7.2.5",8.8,0.64864,0.9846,[48,49,50,51],"CVE-2018-10546","CVE-2018-10547","CVE-2018-10548","CVE-2018-10549",false,"2018-04-29T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.813159","PHP \u003C 5.6.36, 7.x \u003C 7.0.30, 7.1.x \u003C 7.1.17, 7.2.x \u003C 7.2.5 Multiple Vulnerabilities (May 2018) - Windows","2018-05-02T00:00:00Z"]