php-pecl-xdebug3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the php-pecl-xdebug3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • H
NULL Pointer Dereference

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Incorrect Calculation of Buffer Size

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Output Neutralization for Logs

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Validation of Syntactic Correctness of Input

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Insufficient Granularity of Access Control

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Out-of-bounds Read

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Heap-based Buffer Overflow

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Information Exposure

*
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • M
Improper Input Validation

<0:3.2.2-2.module+el8.10.0+20798+00eaeb41
  • L
Use After Free

*
  • H
Out-of-Bounds

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
XML External Entity (XXE) Injection

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
Unchecked Return Value

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Out-of-bounds Write

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
Resource Exhaustion

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
Allocation of Resources Without Limits or Throttling

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
Reversible One-Way Hash

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Integer Overflow or Wraparound

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Integer Overflow to Buffer Overflow

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Improper Input Validation

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Improper Input Validation

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Uncontrolled Recursion

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • H
Buffer Overflow

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Access of Uninitialized Pointer

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Use After Free

<0:3.1.2-1.module+el8.6.0+13671+84712317
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Improper Access Control

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Uncontrolled Recursion

*
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Improper Null Termination

*
  • M
Off-by-one Error

*