Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4jq7-hvr2-qgmp

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

EPSS

Процентиль: 91%
0.06678
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

redhat
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

nvd
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.

debian
больше 19 лет назад

Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 all ...

EPSS

Процентиль: 91%
0.06678
Низкий