
New Vulnerability in PHP's extract() Function Allows Arbitrary Code Execution
VulnerabilitiesCode ExecutionPHPCybersecurity
This content is an AI-generated summary. If you encounter any misinformation or problematic content, please report it to cyb.hub@proton.me.
A new report describes a vulnerability in the extract() function of PHP that allows attackers to trigger a double-free. This vulnerability can then enable the execution of arbitrary code (native code).