CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
85.9%
Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:* |
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:* |
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:* |
php | php | 5.0.0 | cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* |
php | php | 5.0.1 | cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* |
php | php | 5.0.2 | cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* |
php | php | 5.0.3 | cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* |
php | php | 5.0.4 | cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* |
php | php | 5.0.5 | cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* |
php | php | 5.1.0 | cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* |
lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
secunia.com/advisories/18431
secunia.com/advisories/18697
secunia.com/advisories/19012
secunia.com/advisories/19179
secunia.com/advisories/19355
secunia.com/advisories/25945
securitytracker.com/id?1015484
www.debian.org/security/2007/dsa-1331
www.gentoo.org/security/en/glsa/glsa-200603-22.xml
www.hardened-php.net/advisory_012006.112.html
www.mandriva.com/security/advisories?name=MDKSA-2006:028
www.php.net/release_5_1_2.php
www.securityfocus.com/bid/16220
www.vupen.com/english/advisories/2006/0177
www.vupen.com/english/advisories/2006/0369
exchange.xforce.ibmcloud.com/vulnerabilities/24094
usn.ubuntu.com/261-1/