Описание
The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | |
| devel | ignored | |
| hardy | ignored | |
| intrepid | ignored | |
| jaunty | ignored | |
| karmic | ignored | |
| upstream | ignored |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
The unserialize function in PHP 5.3.0 and earlier allows context-depen ...
The unserialize function in PHP 5.3.0 and earlier allows context-dependent attackers to cause a denial of service (resource consumption) via a deeply nested serialized variable, as demonstrated by a string beginning with a:1: followed by many {a:1: sequences.
EPSS
5 Medium
CVSS2