CVE-2007-3806 (GCVE-0-2007-3806)
Vulnerability from cvelistv5
Published
2007-07-17 00:00
Modified
2024-08-07 14:28
Severity ?
CWE
  • n/a
Summary
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
References
cve@mitre.org http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
cve@mitre.org http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
cve@mitre.org http://osvdb.org/36085
cve@mitre.org http://secunia.com/advisories/26085 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/26642 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/27102 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/30158 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/30288 Vendor Advisory
cve@mitre.org http://www.debian.org/security/2008/dsa-1572
cve@mitre.org http://www.debian.org/security/2008/dsa-1578
cve@mitre.org http://www.exploit-db.com/exploits/4181
cve@mitre.org http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
cve@mitre.org http://www.php.net/ChangeLog-5.php#5.2.4
cve@mitre.org http://www.php.net/releases/5_2_4.php
cve@mitre.org http://www.securityfocus.com/bid/24922
cve@mitre.org http://www.securityfocus.com/bid/25498
cve@mitre.org http://www.vupen.com/english/advisories/2007/2547 Vendor Advisory
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
af854a3a-2127-422b-91ae-364da2661108 http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
af854a3a-2127-422b-91ae-364da2661108 http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/36085
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26085 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26642 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/27102 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/30158 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/30288 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2008/dsa-1572
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2008/dsa-1578
af854a3a-2127-422b-91ae-364da2661108 http://www.exploit-db.com/exploits/4181
af854a3a-2127-422b-91ae-364da2661108 http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
af854a3a-2127-422b-91ae-364da2661108 http://www.php.net/ChangeLog-5.php#5.2.4
af854a3a-2127-422b-91ae-364da2661108 http://www.php.net/releases/5_2_4.php
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/24922
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/25498
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/2547 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.456Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "30288",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30288"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
          },
          {
            "name": "36085",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36085"
          },
          {
            "name": "ADV-2007-2547",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2547"
          },
          {
            "name": "php-glob-security-bypass(35437)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
          },
          {
            "name": "4181",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/4181"
          },
          {
            "name": "DSA-1572",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1572"
          },
          {
            "name": "GLSA-200710-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
          },
          {
            "name": "30158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30158"
          },
          {
            "name": "26085",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26085"
          },
          {
            "name": "DSA-1578",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1578"
          },
          {
            "name": "27102",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27102"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.php.net/releases/5_2_4.php"
          },
          {
            "name": "24922",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24922"
          },
          {
            "name": "25498",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25498"
          },
          {
            "name": "26642",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26642"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "30288",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30288"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
        },
        {
          "name": "36085",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36085"
        },
        {
          "name": "ADV-2007-2547",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2547"
        },
        {
          "name": "php-glob-security-bypass(35437)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
        },
        {
          "name": "4181",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/4181"
        },
        {
          "name": "DSA-1572",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1572"
        },
        {
          "name": "GLSA-200710-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
        },
        {
          "name": "30158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30158"
        },
        {
          "name": "26085",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26085"
        },
        {
          "name": "DSA-1578",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1578"
        },
        {
          "name": "27102",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27102"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.php.net/releases/5_2_4.php"
        },
        {
          "name": "24922",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24922"
        },
        {
          "name": "25498",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25498"
        },
        {
          "name": "26642",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26642"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3806",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "30288",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30288"
            },
            {
              "name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167",
              "refsource": "MISC",
              "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
            },
            {
              "name": "36085",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36085"
            },
            {
              "name": "ADV-2007-2547",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2547"
            },
            {
              "name": "php-glob-security-bypass(35437)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
            },
            {
              "name": "4181",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/4181"
            },
            {
              "name": "DSA-1572",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1572"
            },
            {
              "name": "GLSA-200710-02",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
            },
            {
              "name": "http://www.php.net/ChangeLog-5.php#5.2.4",
              "refsource": "CONFIRM",
              "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
            },
            {
              "name": "30158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30158"
            },
            {
              "name": "26085",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26085"
            },
            {
              "name": "DSA-1578",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1578"
            },
            {
              "name": "27102",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27102"
            },
            {
              "name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log",
              "refsource": "MISC",
              "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
            },
            {
              "name": "http://www.php.net/releases/5_2_4.php",
              "refsource": "CONFIRM",
              "url": "http://www.php.net/releases/5_2_4.php"
            },
            {
              "name": "24922",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24922"
            },
            {
              "name": "25498",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25498"
            },
            {
              "name": "26642",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26642"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3806",
    "datePublished": "2007-07-17T00:00:00",
    "dateReserved": "2007-07-16T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.456Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-3806\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-07-17T00:30:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n glob en PHP versi\u00f3n 5.2.3, permite a  atacantes  dependiendo del contexto causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un valor no v\u00e1lido del par\u00e1metro flags, probablemente relacionado con la corrupci\u00f3n de memoria o una lectura no v\u00e1lida en plataformas win32, y posiblemente relacionado con la falta de inicializaci\u00f3n para una estructura glob.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86767200-6C9C-4C3E-B111-0E5BE61E197B\"}]}]}],\"references\":[{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/36085\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26642\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27102\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30158\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30288\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1572\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1578\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/4181\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.php.net/ChangeLog-5.php#5.2.4\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.php.net/releases/5_2_4.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/24922\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/25498\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2547\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35437\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/36085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1572\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/4181\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.php.net/ChangeLog-5.php#5.2.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.php.net/releases/5_2_4.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/24922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable.  This issue only affected PHP on Windows platforms.\",\"lastModified\":\"2007-09-05T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…