Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6p2r-x9m6-65cq

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

EPSS

Процентиль: 87%
0.035
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

redhat
почти 16 лет назад

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

nvd
больше 15 лет назад

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.

debian
больше 15 лет назад

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5 ...

EPSS

Процентиль: 87%
0.035
Низкий