### [CVE-2016-7418](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call. ### POC #### Reference - https://bugs.php.net/bug.php?id=73065 - https://www.tenable.com/security/tns-2016-19 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/RClueX/Hackerone-Reports - https://github.com/imhunterand/hackerone-publicy-disclosed