Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j2mg-c55m-5q6x

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

EPSS

Процентиль: 63%
0.00455
Низкий

Связанные уязвимости

ubuntu
почти 15 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

redhat
около 15 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

nvd
почти 15 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

debian
почти 15 лет назад

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 throu ...

oracle-oval
больше 14 лет назад

ELSA-2010-0919: php security update (MODERATE)

EPSS

Процентиль: 63%
0.00455
Низкий