Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gg33-7vxx-p97w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.

EPSS

Процентиль: 37%
0.00152
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.

nvd
больше 18 лет назад

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.

debian
больше 18 лет назад

The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x ...

EPSS

Процентиль: 37%
0.00152
Низкий