Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-2484

Опубликовано: 30 июн. 2010
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.

Отчет

Red Hat does not consider interruption issues allowing safe_mode / open_basedir restriction bypass to be security sensitive. For more details see https://bugzilla.redhat.com/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=619324php: strrchr() interruption vulnerability

EPSS

Процентиль: 70%
0.00671
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.

nvd
около 15 лет назад

The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.

debian
около 15 лет назад

The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent ...

github
больше 3 лет назад

The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.

EPSS

Процентиль: 70%
0.00671
Низкий

2.1 Low

CVSS2