Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-599v-cg8r-98qv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

EPSS

Процентиль: 94%
0.12408
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

redhat
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

nvd
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.

debian
больше 18 лет назад

The php_binary serialization handler in the session extension in PHP b ...

EPSS

Процентиль: 94%
0.12408
Средний