CVE-2007-3806
Vulnerability from cvelistv5
Published
2007-07-17 00:00
Modified
2024-08-07 14:28
Severity ?
Summary
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
References
cve@mitre.orghttp://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
cve@mitre.orghttp://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
cve@mitre.orghttp://osvdb.org/36085
cve@mitre.orghttp://secunia.com/advisories/26085Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26642Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27102Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30158Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30288Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1572
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1578
cve@mitre.orghttp://www.exploit-db.com/exploits/4181
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
cve@mitre.orghttp://www.php.net/ChangeLog-5.php#5.2.4
cve@mitre.orghttp://www.php.net/releases/5_2_4.php
cve@mitre.orghttp://www.securityfocus.com/bid/24922
cve@mitre.orghttp://www.securityfocus.com/bid/25498
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2547Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35437
af854a3a-2127-422b-91ae-364da2661108http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
af854a3a-2127-422b-91ae-364da2661108http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/36085
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26085Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26642Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27102Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30158Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30288Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1572
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1578
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/4181
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/ChangeLog-5.php#5.2.4
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/releases/5_2_4.php
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24922
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25498
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2547Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.456Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "30288",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30288"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
          },
          {
            "name": "36085",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36085"
          },
          {
            "name": "ADV-2007-2547",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2547"
          },
          {
            "name": "php-glob-security-bypass(35437)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
          },
          {
            "name": "4181",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/4181"
          },
          {
            "name": "DSA-1572",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1572"
          },
          {
            "name": "GLSA-200710-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
          },
          {
            "name": "30158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30158"
          },
          {
            "name": "26085",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26085"
          },
          {
            "name": "DSA-1578",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1578"
          },
          {
            "name": "27102",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27102"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.php.net/releases/5_2_4.php"
          },
          {
            "name": "24922",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24922"
          },
          {
            "name": "25498",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25498"
          },
          {
            "name": "26642",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26642"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "30288",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30288"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
        },
        {
          "name": "36085",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36085"
        },
        {
          "name": "ADV-2007-2547",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2547"
        },
        {
          "name": "php-glob-security-bypass(35437)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
        },
        {
          "name": "4181",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/4181"
        },
        {
          "name": "DSA-1572",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1572"
        },
        {
          "name": "GLSA-200710-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
        },
        {
          "name": "30158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30158"
        },
        {
          "name": "26085",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26085"
        },
        {
          "name": "DSA-1578",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1578"
        },
        {
          "name": "27102",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27102"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.php.net/releases/5_2_4.php"
        },
        {
          "name": "24922",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24922"
        },
        {
          "name": "25498",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25498"
        },
        {
          "name": "26642",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26642"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3806",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "30288",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30288"
            },
            {
              "name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167",
              "refsource": "MISC",
              "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167"
            },
            {
              "name": "36085",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36085"
            },
            {
              "name": "ADV-2007-2547",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2547"
            },
            {
              "name": "php-glob-security-bypass(35437)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35437"
            },
            {
              "name": "4181",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/4181"
            },
            {
              "name": "DSA-1572",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1572"
            },
            {
              "name": "GLSA-200710-02",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
            },
            {
              "name": "http://www.php.net/ChangeLog-5.php#5.2.4",
              "refsource": "CONFIRM",
              "url": "http://www.php.net/ChangeLog-5.php#5.2.4"
            },
            {
              "name": "30158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30158"
            },
            {
              "name": "26085",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26085"
            },
            {
              "name": "DSA-1578",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1578"
            },
            {
              "name": "27102",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27102"
            },
            {
              "name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log",
              "refsource": "MISC",
              "url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log"
            },
            {
              "name": "http://www.php.net/releases/5_2_4.php",
              "refsource": "CONFIRM",
              "url": "http://www.php.net/releases/5_2_4.php"
            },
            {
              "name": "24922",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24922"
            },
            {
              "name": "25498",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25498"
            },
            {
              "name": "26642",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26642"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3806",
    "datePublished": "2007-07-17T00:00:00",
    "dateReserved": "2007-07-16T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.456Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-3806\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-07-17T00:30:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n glob en PHP versi\u00f3n 5.2.3, permite a  atacantes  dependiendo del contexto causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un valor no v\u00e1lido del par\u00e1metro flags, probablemente relacionado con la corrupci\u00f3n de memoria o una lectura no v\u00e1lida en plataformas win32, y posiblemente relacionado con la falta de inicializaci\u00f3n para una estructura glob.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86767200-6C9C-4C3E-B111-0E5BE61E197B\"}]}]}],\"references\":[{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/36085\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26642\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27102\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30158\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30288\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1572\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1578\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/4181\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.php.net/ChangeLog-5.php#5.2.4\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.php.net/releases/5_2_4.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/24922\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/25498\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2547\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35437\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166\u0026r2=1.167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/36085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1572\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/4181\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.php.net/ChangeLog-5.php#5.2.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.php.net/releases/5_2_4.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/24922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable.  This issue only affected PHP on Windows platforms.\",\"lastModified\":\"2007-09-05T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.