CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
97.5%
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | * | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:* |
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:* |
php | php | 5.0 | cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:* |
php | php | 5.0.0 | cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* |
php | php | 5.0.1 | cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* |
php | php | 5.0.2 | cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* |
php | php | 5.0.3 | cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* |
php | php | 5.0.4 | cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* |
php | php | 5.0.5 | cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* |
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
docs.info.apple.com/article.html?artnum=304829
issues.rpath.com/browse/RPL-761
lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
rhn.redhat.com/errata/RHSA-2006-0736.html
secunia.com/advisories/22653
secunia.com/advisories/22685
secunia.com/advisories/22688
secunia.com/advisories/22693
secunia.com/advisories/22713
secunia.com/advisories/22753
secunia.com/advisories/22759
secunia.com/advisories/22779
secunia.com/advisories/22881
secunia.com/advisories/22929
secunia.com/advisories/23139
secunia.com/advisories/23155
secunia.com/advisories/23247
secunia.com/advisories/24606
secunia.com/advisories/25047
security.gentoo.org/glsa/glsa-200703-21.xml
securitytracker.com/id?1017152
securitytracker.com/id?1017296
support.avaya.com/elmodocs2/security/ASA-2006-245.htm
www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html
www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml
www.debian.org/security/2006/dsa-1206
www.hardened-php.net/advisory_132006.138.html
www.mandriva.com/security/advisories?name=MDKSA-2006:196
www.novell.com/linux/security/advisories/2006_67_php.html
www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html
www.php.net/releases/5_2_0.php
www.redhat.com/support/errata/RHSA-2006-0730.html
www.redhat.com/support/errata/RHSA-2006-0731.html
www.securityfocus.com/archive/1/450431/100/0/threaded
www.securityfocus.com/archive/1/451098/100/0/threaded
www.securityfocus.com/archive/1/453024/100/0/threaded
www.securityfocus.com/bid/20879
www.trustix.org/errata/2006/0061/
www.turbolinux.com/security/2006/TLSA-2006-38.txt
www.ubuntu.com/usn/usn-375-1
www.us-cert.gov/cas/techalerts/TA06-333A.html
www.vupen.com/english/advisories/2006/4317
www.vupen.com/english/advisories/2006/4749
www.vupen.com/english/advisories/2006/4750
www.vupen.com/english/advisories/2007/1546
exchange.xforce.ibmcloud.com/vulnerabilities/29971
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240