Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-5465

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-04 Nov, 2006 | 00:00
Updated At-07 Aug, 2024 | 19:48
Rejected At-
Credits

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:04 Nov, 2006 | 00:00
Updated At:07 Aug, 2024 | 19:48
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/22881
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1017152
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/4749
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/450431/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2006-0731.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/22759
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24606
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1546
vdb-entry
x_refsource_VUPEN
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
vendor-advisory
x_refsource_TURBO
http://www.debian.org/security/2006/dsa-1206
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/22693
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23247
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22653
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22688
third-party-advisory
x_refsource_SECUNIA
http://www.trustix.org/errata/2006/0061/
vendor-advisory
x_refsource_TRUSTIX
http://www.securityfocus.com/archive/1/453024/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200703-21.xml
vendor-advisory
x_refsource_GENTOO
http://www.securityfocus.com/archive/1/451098/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22713
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22685
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4317
vdb-entry
x_refsource_VUPEN
http://www.hardened-php.net/advisory_132006.138.html
x_refsource_MISC
http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
vendor-advisory
x_refsource_CISCO
http://issues.rpath.com/browse/RPL-761
x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
vendor-advisory
x_refsource_SGI
http://www.novell.com/linux/security/advisories/2006_67_php.html
vendor-advisory
x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
vdb-entry
x_refsource_XF
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/25047
third-party-advisory
x_refsource_SECUNIA
http://securitytracker.com/id?1017296
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/22779
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-0730.html
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/bid/20879
vdb-entry
x_refsource_BID
http://www.ubuntu.com/usn/usn-375-1
vendor-advisory
x_refsource_UBUNTU
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
vendor-advisory
x_refsource_CISCO
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
vendor-advisory
x_refsource_OPENPKG
http://secunia.com/advisories/22929
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22753
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/23139
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2006-0736.html
vendor-advisory
x_refsource_REDHAT
http://www.php.net/releases/5_2_0.php
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22881
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1017152
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vupen.com/english/advisories/2006/4749
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/450431/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0731.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/22759
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24606
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1546
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
Resource:
vendor-advisory
x_refsource_TURBO
Hyperlink: http://www.debian.org/security/2006/dsa-1206
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/22693
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23247
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22653
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22688
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.trustix.org/errata/2006/0061/
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.securityfocus.com/archive/1/453024/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://security.gentoo.org/glsa/glsa-200703-21.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securityfocus.com/archive/1/451098/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22713
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22685
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2006/4317
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.hardened-php.net/advisory_132006.138.html
Resource:
x_refsource_MISC
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://issues.rpath.com/browse/RPL-761
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://www.novell.com/linux/security/advisories/2006_67_php.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/25047
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securitytracker.com/id?1017296
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/22779
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0730.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securityfocus.com/bid/20879
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.ubuntu.com/usn/usn-375-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://secunia.com/advisories/22929
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22753
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
Resource:
x_refsource_CONFIRM
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/23139
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2006-0736.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.php.net/releases/5_2_0.php
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/22881
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1017152
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2006/4750
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vupen.com/english/advisories/2006/4749
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/450431/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0731.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/22759
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24606
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1546
vdb-entry
x_refsource_VUPEN
x_transferred
http://docs.info.apple.com/article.html?artnum=304829
x_refsource_CONFIRM
x_transferred
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
vendor-advisory
x_refsource_TURBO
x_transferred
http://www.debian.org/security/2006/dsa-1206
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/22693
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23247
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22653
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22688
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.trustix.org/errata/2006/0061/
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.securityfocus.com/archive/1/453024/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://security.gentoo.org/glsa/glsa-200703-21.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securityfocus.com/archive/1/451098/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22713
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22685
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2006/4317
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.hardened-php.net/advisory_132006.138.html
x_refsource_MISC
x_transferred
http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
vendor-advisory
x_refsource_CISCO
x_transferred
http://issues.rpath.com/browse/RPL-761
x_refsource_CONFIRM
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
vendor-advisory
x_refsource_SGI
x_transferred
http://www.novell.com/linux/security/advisories/2006_67_php.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/23155
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/25047
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securitytracker.com/id?1017296
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/22779
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0730.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/bid/20879
vdb-entry
x_refsource_BID
x_transferred
http://www.ubuntu.com/usn/usn-375-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://secunia.com/advisories/22929
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22753
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
x_refsource_CONFIRM
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/23139
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2006-0736.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.php.net/releases/5_2_0.php
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22881
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1017152
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4749
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/450431/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0731.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/22759
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24606
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1546
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
Resource:
vendor-advisory
x_refsource_TURBO
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1206
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/22693
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23247
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22653
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22688
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.trustix.org/errata/2006/0061/
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/453024/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200703-21.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/451098/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22713
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22685
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4317
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.hardened-php.net/advisory_132006.138.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://issues.rpath.com/browse/RPL-761
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_67_php.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/23155
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/25047
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securitytracker.com/id?1017296
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/22779
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0730.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20879
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-375-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Resource:
third-party-advisory
x_refsource_CERT
x_transferred
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://secunia.com/advisories/22929
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22753
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/23139
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2006-0736.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.php.net/releases/5_2_0.php
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:04 Nov, 2006 | 00:07
Updated At:30 Oct, 2018 | 16:25

Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>php>>Versions up to 5.1.6(inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0
cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.0
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.1
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.2
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.3
cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.4
cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.0.5
cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.0
cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.1
cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.2
cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.3
cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.4
cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>5.1.5
cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-Psecalert@redhat.com
N/A
http://docs.info.apple.com/article.html?artnum=304829secalert@redhat.com
N/A
http://issues.rpath.com/browse/RPL-761secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2006-0736.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/22653secalert@redhat.com
N/A
http://secunia.com/advisories/22685secalert@redhat.com
N/A
http://secunia.com/advisories/22688secalert@redhat.com
N/A
http://secunia.com/advisories/22693secalert@redhat.com
N/A
http://secunia.com/advisories/22713secalert@redhat.com
N/A
http://secunia.com/advisories/22753secalert@redhat.com
N/A
http://secunia.com/advisories/22759secalert@redhat.com
N/A
http://secunia.com/advisories/22779secalert@redhat.com
N/A
http://secunia.com/advisories/22881secalert@redhat.com
N/A
http://secunia.com/advisories/22929secalert@redhat.com
N/A
http://secunia.com/advisories/23139secalert@redhat.com
N/A
http://secunia.com/advisories/23155secalert@redhat.com
N/A
http://secunia.com/advisories/23247secalert@redhat.com
N/A
http://secunia.com/advisories/24606secalert@redhat.com
N/A
http://secunia.com/advisories/25047secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200703-21.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1017152secalert@redhat.com
N/A
http://securitytracker.com/id?1017296secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htmsecalert@redhat.com
N/A
http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.htmlsecalert@redhat.com
N/A
http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1206secalert@redhat.com
N/A
http://www.hardened-php.net/advisory_132006.138.htmlsecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:196secalert@redhat.com
N/A
http://www.novell.com/linux/security/advisories/2006_67_php.htmlsecalert@redhat.com
N/A
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.htmlsecalert@redhat.com
N/A
http://www.php.net/releases/5_2_0.phpsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0730.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2006-0731.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/450431/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/451098/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/453024/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/20879secalert@redhat.com
N/A
http://www.trustix.org/errata/2006/0061/secalert@redhat.com
N/A
http://www.turbolinux.com/security/2006/TLSA-2006-38.txtsecalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-375-1secalert@redhat.com
N/A
http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlsecalert@redhat.com
US Government Resource
http://www.vupen.com/english/advisories/2006/4317secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4749secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2006/4750secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1546secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240secalert@redhat.com
N/A
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=304829
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://issues.rpath.com/browse/RPL-761
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2006-0736.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22653
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22685
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22688
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22693
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22713
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22753
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22759
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22779
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22881
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/22929
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23139
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23155
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23247
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24606
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25047
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200703-21.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017152
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017296
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2006/dsa-1206
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.hardened-php.net/advisory_132006.138.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:196
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.novell.com/linux/security/advisories/2006_67_php.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.php.net/releases/5_2_0.php
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0730.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0731.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/450431/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/451098/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/453024/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/20879
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2006/0061/
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-375-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Source: secalert@redhat.com
Resource:
US Government Resource
Hyperlink: http://www.vupen.com/english/advisories/2006/4317
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4749
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/4750
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1546
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29971
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

222Records found

CVE-2015-3307
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-9.63% / 92.58%
||
7 Day CHG~0.00%
Published-09 Jun, 2015 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP GroupApple Inc.
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_eusmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-3415
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.38% / 86.90%
||
7 Day CHG~0.00%
Published-24 Apr, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.

Action-Not Available
Vendor-sqliten/aThe PHP GroupApple Inc.Debian GNU/LinuxCanonical Ltd.
Product-watchosubuntu_linuxphpdebian_linuxmac_os_xsqliten/a
CWE ID-CWE-404
Improper Resource Shutdown or Release
CVE-2015-4116
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.15% / 88.22%
||
7 Day CHG~0.00%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.

Action-Not Available
Vendor-n/aThe PHP GroupopenSUSE
Product-leapphpn/a
CVE-2015-4025
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.81% / 85.57%
||
7 Day CHG~0.00%
Published-09 Jun, 2015 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

Action-Not Available
Vendor-n/aRed Hat, Inc.The PHP GroupApple Inc.
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_eusmac_os_xn/a
CVE-2015-3416
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.20% / 86.50%
||
7 Day CHG~0.00%
Published-24 Apr, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

Action-Not Available
Vendor-sqliten/aThe PHP GroupApple Inc.Debian GNU/LinuxCanonical Ltd.
Product-watchosubuntu_linuxphpdebian_linuxmac_os_xsqliten/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2015-2301
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.97% / 92.26%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.The PHP GroupApple Inc.Debian GNU/LinuxCanonical Ltd.
Product-enterprise_linux_serverenterprise_linux_hpc_nodeopensuseenterprise_linux_hpc_node_eusubuntu_linuxenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpdebian_linuxmac_os_xn/a
CWE ID-CWE-416
Use After Free
CVE-2015-2787
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-22.99% / 95.70%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.

Action-Not Available
Vendor-n/aopenSUSERed Hat, Inc.The PHP GroupApple Inc.
Product-enterprise_linux_serverenterprise_linux_hpc_nodeopensuseenterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationphpenterprise_linux_hpc_node_eusmac_os_xn/a
CVE-2015-2331
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-33.23% / 96.76%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.

Action-Not Available
Vendor-nihn/aopenSUSEFedora ProjectThe PHP GroupDebian GNU/Linux
Product-fedoraopensusephpdebian_linuxlibzipn/a
CVE-2005-1042
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-4.92% / 89.20%
||
7 Day CHG~0.00%
Published-12 Apr, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2015-1351
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-7.24% / 91.25%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Action-Not Available
Vendor-n/aThe PHP GroupApple Inc.Oracle Corporation
Product-solarisphplinuxmac_os_xsecure_backupn/a
CWE ID-CWE-416
Use After Free
CVE-2015-0273
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-55.92% / 98.01%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2014-9653
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.74% / 87.55%
||
7 Day CHG~0.00%
Published-30 Mar, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.

Action-Not Available
Vendor-file_projectn/aDebian GNU/LinuxThe PHP Group
Product-filedebian_linuxphpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-9425
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.36% / 88.51%
||
7 Day CHG~0.00%
Published-31 Dec, 2014 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Action-Not Available
Vendor-n/aThe PHP GroupApple Inc.
Product-mac_os_xphpn/a
CVE-2014-8142
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-87.38% / 99.42%
||
7 Day CHG~0.00%
Published-20 Dec, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CVE-2017-5340
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.86% / 90.98%
||
7 Day CHG~0.00%
Published-11 Jan, 2017 | 06:02
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.

Action-Not Available
Vendor-n/aThe PHP GroupNetApp, Inc.
Product-clustered_data_ontapphpn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2013-2220
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.03% / 83.06%
||
7 Day CHG~0.00%
Published-31 Jul, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.

Action-Not Available
Vendor-radius_extension_projectn/aThe PHP Group
Product-radiusphpn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2016-9936
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.84% / 73.80%
||
7 Day CHG~0.00%
Published-04 Jan, 2017 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-416
Use After Free
CVE-2016-9935
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.32% / 84.18%
||
7 Day CHG~0.00%
Published-04 Jan, 2017 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-9137
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.89% / 74.58%
||
7 Day CHG~0.00%
Published-04 Jan, 2017 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-416
Use After Free
CVE-2017-9225
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.43%
||
7 Day CHG~0.00%
Published-24 May, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow.

Action-Not Available
Vendor-oniguruma_projectn/aThe PHP GroupRuby
Product-onigurumarubyphpn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2016-4539
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-9.8||CRITICAL
EPSS-2.13% / 83.46%
||
7 Day CHG+0.06%
Published-22 May, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.

Action-Not Available
Vendor-n/aFedora ProjectThe PHP GroupopenSUSE
Product-leapfedoraphpn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-8835
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.13% / 83.49%
||
7 Day CHG~0.00%
Published-16 May, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found