Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-599v-cg8r-98qv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

EPSS

Процентиль: 94%
0.12708
Средний

Связанные уязвимости

ubuntu
почти 19 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

redhat
почти 19 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

nvd
почти 19 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

debian
почти 19 лет назад

The php_binary serialization handler in the session extension in PHP b ...

EPSS

Процентиль: 94%
0.12708
Средний