Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-37px-x6g4-3pm2

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

EPSS

Процентиль: 60%
0.00398
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

redhat
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

nvd
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

debian
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-depen ...

EPSS

Процентиль: 60%
0.00398
Низкий