Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-1064

Опубликовано: 10 янв. 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 10

Описание

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

РелизСтатусПримечание
dapper

released

4.4.2-1build1
devel

DNE

edgy

released

4.4.2-1build1
feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.9
devel

released

5.2.3-1ubuntu5
edgy

released

5.1.6-1ubuntu2.6
feisty

released

5.2.1-0ubuntu1.4
upstream

needs-triage

Показывать по

EPSS

Процентиль: 82%
0.0182
Низкий

10 Critical

CVSS2

Связанные уязвимости

nvd
больше 20 лет назад

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

debian
больше 20 лет назад

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate ...

github
около 3 лет назад

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

EPSS

Процентиль: 82%
0.0182
Низкий

10 Critical

CVSS2