Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fgqw-vvrq-jg84

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.

EPSS

Процентиль: 83%
0.02018
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.

nvd
больше 18 лет назад

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.

debian
больше 18 лет назад

Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering ...

EPSS

Процентиль: 83%
0.02018
Низкий