18 September 2018
Multiple vulnerabilities have been found in PHP. A remote attacker could exploit the vulnerabilities via specially crafted requests.
A successful attack could lead to arbitrary code execution, privilege escalation, information disclosure, denial of service and take control of an affected system.
The product vendor has released new versions to address the issues and they can be downloaded at the following URL:
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.