Логотип exploitDog
bind:CVE-2004-0542
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-0542

Количество 3

Количество 3

nvd логотип

CVE-2004-0542

около 21 года назад

PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.

CVSS2: 10
EPSS: Средний
debian логотип

CVE-2004-0542

около 21 года назад

PHP before 4.3.7 on Win32 platforms does not properly filter all shell ...

CVSS2: 10
EPSS: Средний
github логотип

GHSA-ccf6-wjg8-65fx

больше 3 лет назад

PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-0542

PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.

CVSS2: 10
12%
Средний
около 21 года назад
debian логотип
CVE-2004-0542

PHP before 4.3.7 on Win32 platforms does not properly filter all shell ...

CVSS2: 10
12%
Средний
около 21 года назад
github логотип
GHSA-ccf6-wjg8-65fx

PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.

12%
Средний
больше 3 лет назад

Уязвимостей на страницу