scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation78 reference(s) from NVD