Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2g5f-835h-7qjr

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).

EPSS

Процентиль: 96%
0.30449
Средний

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 18 лет назад

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).

redhat
больше 18 лет назад

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).

nvd
больше 18 лет назад

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).

debian
больше 18 лет назад

Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote ...

EPSS

Процентиль: 96%
0.30449
Средний

Дефекты

CWE-94