_php_mb_regex_ereg_replace_exec - double free
Unknown
Vulnerability Details
_php_mb_regex_ereg_replace_exec is prone to double free that can be turned into a code execution.
Details about the bug: https://bugs.php.net/bug.php?id=72402 (already fixed)
Actions
View on HackerOneReport Stats
- Report ID: 146200
- State: Closed
- Substate: resolved
- Upvotes: 1