Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gr45-244x-jmrm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

EPSS

Процентиль: 52%
0.00287
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

redhat
почти 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

nvd
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

debian
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 ...

EPSS

Процентиль: 52%
0.00287
Низкий