漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
漏洞信息
N/A
漏洞
N/A
漏洞
PHP EXT/Session HTTP响应页眉注入漏洞
漏洞信息
PHP 4.x版本至4.4.7版本和5.x版本至5.2.3版本的ext/session的session_start函数允许远程攻击者可以借助一个cookie中的特殊字符,且该cookie从(1)PATH_INFO,(2)session_id函数,和(3)session_start函数中获得,向会话cookie中注入任意字符。这些字符在新会话cookie产生的时候没有被编码或被过滤。
漏洞信息
N/A
漏洞
N/A