Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pv64-xrrh-rjxj

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.

EPSS

Процентиль: 62%
0.00436
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.

nvd
около 18 лет назад

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.

debian
около 18 лет назад

PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-depende ...

EPSS

Процентиль: 62%
0.00436
Низкий