Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1413

Опубликовано: 12 мар. 2007
Источник: debian
EPSS Средний

Описание

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4removedpackage
php5removedpackage

Примечания

  • Only triggerable by malicious script

EPSS

Процентиль: 96%
0.22405
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

nvd
больше 18 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

github
больше 3 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

EPSS

Процентиль: 96%
0.22405
Средний