(, ) (,
. '.' ) ('.',
). , ('. ( ) (
(_,) .'), ) _ _,
/ _/ / _ \ _
\ \==/ /_\ \ _/ ___\/ _ \ / \
/ \/ |\\ \__( <_> ) Y Y \
/__ /\___|__ / \___ >/|__|_| /
\/ \/.-.\/ \/:wq
# Type Confusion Infoleak and Heap Overflow Vulnerability in
unserialize() with exception
Taoguang Chen <[@chtg](http://github.com/chtg)> - Write Date: 2015.3.3
- Release Date: 2015.4.28
> A type confusion vulnerability was discovered in exception object's
> __toString()/getTraceAsString() metho
# Type Confusion Infoleak Vulnerability in unserialize() with SoapFault
Taoguang Chen <[@chtg](http://github.com/chtg)> - Write Date: 2015.3.1
- Release Date: 2015.4.28
> A type confusion vulnerability was discovered in unserialize() with SoapFault
> object's __toString() magic method that can b
#
#
# SWISSCOM CSIRT ADVISORY - http://www.swisscom.com/security
#
#
#
# CVE ID: CVE-2015-1188
# Product: Swisscom DSL Router Centro Grande (ADB)
# Vendor: ADB
# Subject: In