Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-47wx-x56j-fgjm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

EPSS

Процентиль: 93%
0.12155
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

nvd
больше 18 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.

debian
больше 18 лет назад

The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x s ...

EPSS

Процентиль: 93%
0.12155
Средний