Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-4010

Опубликовано: 26 июл. 2007
Источник: debian
EPSS Низкий

Описание

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5not-affectedpackage

EPSS

Процентиль: 88%
0.04032
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

nvd
больше 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

github
почти 4 года назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

EPSS

Процентиль: 88%
0.04032
Низкий