Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1864

Опубликовано: 03 мая 2010
Источник: redhat
EPSS Низкий

Описание

The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

Отчет

Red Hat does not consider interruption issues allowing safe_mode / open_basedir restriction bypass to be security sensitive. For more details see https://bugzilla.redhat.com/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=617578php: addcslashes interruption vulnerability (MOPS-2010-006)

EPSS

Процентиль: 61%
0.00421
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

nvd
больше 15 лет назад

The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

debian
больше 15 лет назад

The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3 ...

github
около 3 лет назад

The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

EPSS

Процентиль: 61%
0.00421
Низкий