Логотип exploitDog
bind:CVE-2001-1246
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-1246

Количество 3

Количество 3

redhat логотип

CVE-2001-1246

почти 24 года назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS: Низкий
nvd логотип

CVE-2001-1246

почти 24 года назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-7pf5-hfgr-ch72

около 3 лет назад

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2001-1246

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

2%
Низкий
почти 24 года назад
nvd логотип
CVE-2001-1246

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

CVSS2: 7.5
2%
Низкий
почти 24 года назад
github логотип
GHSA-7pf5-hfgr-ch72

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

2%
Низкий
около 3 лет назад

Уязвимостей на страницу