Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-0830

Опубликовано: 02 фев. 2012
Источник: redhat
CVSS2: 7.5
EPSS Средний

Описание

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=786686php: remote code exec flaw introduced in the CVE-2011-4885 hashdos fix

EPSS

Процентиль: 98%
0.45597
Средний

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.

nvd
больше 13 лет назад

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.

debian
больше 13 лет назад

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 ...

github
больше 3 лет назад

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.

oracle-oval
больше 13 лет назад

ELSA-2012-0093: php security update (CRITICAL)

EPSS

Процентиль: 98%
0.45597
Средний

7.5 High

CVSS2