漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
漏洞信息
N/A
漏洞
N/A
漏洞
PHP addslahes() 信息泄露漏洞
漏洞信息
PHP是应用较广的Web脚本语言。 PHP 4.3.9中的addslashes函数不能正常转义NULL字符,这使得远程攻击者可能读取任意文件。但另一方面,magic_quotes_gpc又提供了对应的保护机制。该漏洞存在激励讨论,可能会在将来出现重大改动。
漏洞信息
N/A
漏洞
N/A