Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7m24-mw96-fh3w

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

EPSS

Процентиль: 57%
0.00352
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

redhat
почти 17 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

nvd
больше 14 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

debian
больше 14 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might mak ...

CVSS3: 5.3
fstec
больше 14 лет назад

Уязвимость функции mt_rand интерпретатора языка программирования PHP, позволяющая нарушителю прогнозировать возвращаемые значений

EPSS

Процентиль: 57%
0.00352
Низкий