{"uuid": "f677a2f0-8157-4c43-ba85-366bb5cac810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31631", "type": "seen", "source": "https://t.me/cibsecurity/82730", "content": "\ud83e\udd85 CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch \ud83e\udd85\n\nCyble CVE202231631 HighRisk PHP Vulnerability Demands Immediate Patch  \" dataimagecaption\"Cyble CVE202231631 HighRisk PHP Vulnerability Demands Immediate Patch  \" datamediumfile\"httpscyble.comwpcontentuploads202502CybleBlogsVulnerability300x150.jpg\" datalargefile\"httpscyble.comwpcontentuploads202502CybleBlogsVulnerability1024x512.jpg\" title\"CVE202231631 HighRisk PHP Vulnerability Demands Immediate Patch 1\"  Overview     A critical security vulnerability has been identified in PHP, one of the most widely used serverside scripting languages for web development.   The vulnerability, tracked as\u00a0CVE202231631, affects multiple versions of PHP and poses a significant risk to websites and applications relying on the PHP Data Objects PDO extension for SQLite database interactions. The flaw, whic...\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"CYBLE\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-02-18T14:31:11.000000Z"}