The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
7.5CVSS
7.4AI Score
0.003EPSS
5.3CVSS
5.3AI Score
0.001EPSS
A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL.
6.5CVSS
6.8AI Score
0.001EPSS
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php.
9.8CVSS
9.3AI Score
0.002EPSS