Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-4010

Опубликовано: 26 июл. 2007
Источник: debian
EPSS Низкий

Описание

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5not-affectedpackage

EPSS

Процентиль: 87%
0.03547
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

nvd
около 18 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

github
больше 3 лет назад

The win32std extension in PHP 5.2.3 does not follow safe_mode and disable_functions restrictions, which allows remote attackers to execute arbitrary commands via the win_shell_execute function.

EPSS

Процентиль: 87%
0.03547
Низкий