CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
55.3%
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script’s use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | * | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
php | php | 1.0 | cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:* |
php | php | 2.0 | cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:* |
php | php | 2.0b10 | cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:* |
php | php | 3.0 | cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:* |
php | php | 3.0.1 | cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:* |
php | php | 3.0.2 | cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:* |
php | php | 3.0.3 | cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:* |
php | php | 3.0.4 | cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:* |
php | php | 3.0.5 | cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:* |