Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jh35-xrpp-vv4q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

EPSS

Процентиль: 43%
0.00202
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

redhat
почти 19 лет назад

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

nvd
почти 19 лет назад

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

debian
почти 19 лет назад

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass ...

EPSS

Процентиль: 43%
0.00202
Низкий