Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1868

Опубликовано: 07 мая 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.19
devel

not-affected

5.3.3-1ubuntu6
hardy

released

5.2.4-2ubuntu5.12
jaunty

released

5.2.6.dfsg.1-3ubuntu4.6
karmic

released

5.2.10.dfsg.1-2ubuntu6.5
lucid

released

5.3.2-1ubuntu4.5
upstream

released

5.3.3

Показывать по

EPSS

Процентиль: 74%
0.0084
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.

nvd
около 15 лет назад

The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.

debian
около 15 лет назад

The (1) sqlite_single_query and (2) sqlite_array_query functions in ex ...

github
около 3 лет назад

The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.

EPSS

Процентиль: 74%
0.0084
Низкий

7.5 High

CVSS2