Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4418

Опубликовано: 05 нояб. 2009
Источник: redhat
EPSS Низкий

Описание

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

Отчет

Red Hat does not consider this to be a security flaw. For further details, see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4418

Ссылки на источники

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 60%
0.00398
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

nvd
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

debian
больше 15 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-depen ...

github
около 3 лет назад

The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.

EPSS

Процентиль: 60%
0.00398
Низкий