Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r84c-ppfc-cj9g

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

EPSS

Процентиль: 96%
0.25024
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

redhat
больше 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

nvd
больше 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

debian
больше 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and ea ...

EPSS

Процентиль: 96%
0.25024
Средний

Дефекты

CWE-119