Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7pf5-hfgr-ch72

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS

Процентиль: 82%
0.01904
Низкий

Дефекты

CWE-88

Связанные уязвимости

redhat
почти 24 года назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

nvd
почти 24 года назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS

Процентиль: 82%
0.01904
Низкий

Дефекты

CWE-88