Логотип exploitDog
bind:CVE-2007-4596
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-4596

Количество 4

Количество 4

ubuntu логотип

CVE-2007-4596

около 18 лет назад

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2007-4596

около 18 лет назад

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2007-4596

около 18 лет назад

The perl extension in PHP does not follow safe_mode restrictions, whic ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-85qm-c7q8-mxvh

больше 3 лет назад

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-4596

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

CVSS2: 7.5
7%
Низкий
около 18 лет назад
nvd логотип
CVE-2007-4596

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

CVSS2: 7.5
7%
Низкий
около 18 лет назад
debian логотип
CVE-2007-4596

The perl extension in PHP does not follow safe_mode restrictions, whic ...

CVSS2: 7.5
7%
Низкий
около 18 лет назад
github логотип
GHSA-85qm-c7q8-mxvh

The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.

7%
Низкий
больше 3 лет назад

Уязвимостей на страницу