Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-47wx-x56j-fgjm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

EPSS

Процентиль: 94%
0.13846
Средний

Связанные уязвимости

ubuntu
почти 19 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

nvd
почти 19 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

debian
почти 19 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x s ...

EPSS

Процентиль: 94%
0.13846
Средний