Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q3r7-7jgj-hp9p

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

EPSS

Процентиль: 87%
0.03665
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

nvd
около 18 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.

debian
около 18 лет назад

Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and ...

EPSS

Процентиль: 87%
0.03665
Низкий