{ "schema_version": "1.4.0", "id": "GHSA-fg67-3jp9-xqx8", "modified": "2025-04-20T03:34:09Z", "published": "2022-05-17T02:54:32Z", "aliases": [ "CVE-2017-5358" ], "details": "Stack-based buffer overflows in php_Easycom5_3_0.dll in EasyCom for PHP 4.0.0.29 allows remote attackers to execute arbitrary code via the server argument to the (1) i5_connect, (2) i5_pconnect, or (3) i5_private_connect API function.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5358" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41425" }, { "type": "WEB", "url": "http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2017/Feb/60" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96419" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-15T15:59:00Z" } }