Логотип exploitDog
bind:CVE-2007-1381
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-1381

Количество 4

Количество 4

ubuntu логотип

CVE-2007-1381

почти 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий
nvd логотип

CVE-2007-1381

почти 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
EPSS: Низкий
debian логотип

CVE-2007-1381

почти 19 лет назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10 ...

CVSS2: 7.6
EPSS: Низкий
github логотип

GHSA-fpm5-pg7v-gq2g

почти 4 года назад

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
почти 19 лет назад
nvd логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

CVSS2: 7.6
5%
Низкий
почти 19 лет назад
debian логотип
CVE-2007-1381

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10 ...

CVSS2: 7.6
5%
Низкий
почти 19 лет назад
github логотип
GHSA-fpm5-pg7v-gq2g

The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.

5%
Низкий
почти 4 года назад

Уязвимостей на страницу