Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-4486

Опубликовано: 31 авг. 2006
Источник: debian
EPSS Низкий

Описание

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.1.6-1package
php4fixed4:4.4.4-1package

EPSS

Процентиль: 82%
0.01759
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

redhat
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

nvd
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

github
около 3 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

EPSS

Процентиль: 82%
0.01759
Низкий