Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-1494

Опубликовано: 10 апр. 2006
Источник: debian
EPSS Низкий

Описание

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4fixed4:4.4.4-1package
php5fixed5.1.4-0.1package

Примечания

  • open_basedir violations are not supported

EPSS

Процентиль: 88%
0.04053
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

redhat
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

nvd
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

github
больше 3 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

EPSS

Процентиль: 88%
0.04053
Низкий