Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-4020

Опубликовано: 08 авг. 2006
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 4.6

Описание

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.9
devel

released

5.2.3-1ubuntu5
edgy

released

5.1.6-1ubuntu2.6
feisty

released

5.2.1-0ubuntu1.4
upstream

needs-triage

Показывать по

EPSS

Процентиль: 88%
0.03881
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

redhat
почти 19 лет назад

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

nvd
почти 19 лет назад

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

debian
почти 19 лет назад

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows contex ...

github
около 3 лет назад

scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.

EPSS

Процентиль: 88%
0.03881
Низкий

4.6 Medium

CVSS2