Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w6xh-r634-49c8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

EPSS

Процентиль: 87%
0.03406
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

redhat
больше 14 лет назад

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

nvd
больше 14 лет назад

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

debian
больше 14 лет назад

Use-after-free vulnerability in the substr_replace function in PHP 5.3 ...

oracle-oval
больше 13 лет назад

ELSA-2012-0033: php security update (MODERATE)

EPSS

Процентиль: 87%
0.03406
Низкий