9 lines
No EOL
639 B
Text
9 lines
No EOL
639 B
Text
source: https://www.securityfocus.com/bid/10471/info
|
|
|
|
PHP is reportedly prone to a command execution vulnerability in its shell escape functions. This issue is due to a failure of PHP to properly sanitize function arguments.
|
|
|
|
This issue might allow an attacker to execute arbitrary shell commands on a computer running the vulnerable software within the security context of the web server; potentially leading to unauthorized access. Other attacks are also possible.
|
|
|
|
This issue is reported to affect PHP under Microsoft Windows version 4.3.3 and 4.3.5, it is likely that other Microsoft Windows versions are affected as well.
|
|
|
|
" || dir || |