Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1413

Опубликовано: 12 мар. 2007
Источник: debian
EPSS Средний

Описание

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4removedpackage
php5removedpackage

Примечания

  • Only triggerable by malicious script

EPSS

Процентиль: 94%
0.13425
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

nvd
больше 18 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

github
около 3 лет назад

Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).

EPSS

Процентиль: 94%
0.13425
Средний