Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmm8-4p47-889q

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

EPSS

Процентиль: 82%
0.01759
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

redhat
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

nvd
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.

debian
почти 19 лет назад

Integer overflow in memory allocation routines in PHP before 5.1.6, wh ...

EPSS

Процентиль: 82%
0.01759
Низкий