Vulnerability Details : CVE-2016-5095
Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
Vulnerability category: OverflowDenial of service
Threat overview for CVE-2016-5095
Top countries where our scanners detected CVE-2016-5095
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-5095 396,551
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-5095!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-5095
2.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less