Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-966w-852v-c3c4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.

EPSS

Процентиль: 93%
0.10164
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.

nvd
почти 18 лет назад

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.

debian
почти 18 лет назад

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP ...

EPSS

Процентиль: 93%
0.10164
Средний