Description
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
Remediation
References
Related Vulnerabilities
WordPress Plugin Advance Menu Manager Security Bypass (3.0)
WordPress Plugin Knews Multilingual Newsletters SQL Injection (1.7.0)
Oracle Database Server CVE-2007-5520 Vulnerability (CVE-2007-5520)
WordPress Plugin Events Manager Extended Multiple HTML Injection Vulnerabilities (3.1.2)
Liferay Portal Incorrect Default Permissions Vulnerability (CVE-2021-33327)