Lucene search

K

php5 - several

๐Ÿ—“๏ธย 09 May 2012ย 00:00:00Reported byย GoogleTypeย 
osv
ย osv
๐Ÿ”—ย osv.dev๐Ÿ‘ย 37ย Views

De Eindbazen discovered that PHP, when run with mod\_cgi, interprets a query string as command line parameters, allowing execution of arbitrary code. Also, fixes insufficient validation of upload name leading to corrupted $\_FILES indices

Show more
Related
Refs

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
09 May 2012 00:00Current
4.4Medium risk
Vulners AI Score4.4
EPSS0.957
37
.json
Report