
CVE-2006-2563
https://notcve.org/view.php?id=CVE-2006-2563
29 May 2006 — The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters. • http://secunia.com/advisories/20337 •

CVE-2006-1990
https://notcve.org/view.php?id=CVE-2006-1990
24 Apr 2006 — Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396. Desbordamiento de entero en la función wordwrap en string.c en PHP 4.4.2 y 5.1.2 podría permitir a atacantes dependientes del contexto ejecutar código arbitrario a través de ciertos ... • ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U •

CVE-2006-1549 – PHP 4/5 - Executor Deep Recursion Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-1549
10 Apr 2006 — PHP 4.4.2 and 5.1.2 allows local users to cause a crash (segmentation fault) by defining and executing a recursive function. NOTE: it has been reported by a reliable third party that some later versions are also affected. • https://www.exploit-db.com/exploits/29693 • CWE-399: Resource Management Errors •

CVE-2006-1608 – PHP 4.x - 'copy() Safe_Mode' Bypass
https://notcve.org/view.php?id=CVE-2006-1608
10 Apr 2006 — The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI. • https://www.exploit-db.com/exploits/27596 •

CVE-2006-1494 – PHP 4.x - 'tempnam() open_basedir' Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1494
10 Apr 2006 — Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function. • https://www.exploit-db.com/exploits/27595 •

CVE-2006-0996 – PHP 4.x/5.0/5.1 - PHPInfo Large Input Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2006-0996
10 Apr 2006 — Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed. Vulnerabilidad de XSS en phpinfo (info.c) en PHP 5.1.2 y 4.4.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de variables de array largas incluyendo (1) un gran número de dimensiones o ... • https://www.exploit-db.com/exploits/27564 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2006-1490 – PHP 4.x/5.x - 'Html_Entity_Decode()' Information Disclosure
https://notcve.org/view.php?id=CVE-2006-1490
29 Mar 2006 — PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents. • https://www.exploit-db.com/exploits/27508 •

CVE-2006-1014 – PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1014
07 Mar 2006 — Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE. • https://www.exploit-db.com/exploits/27335 •

CVE-2006-1015 – PHP 4.x/5.0/5.1 with Sendmail Mail Function - 'additional_param' Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2006-1015
07 Mar 2006 — Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE. • https://www.exploit-db.com/exploits/27334 •

CVE-2006-1017
https://notcve.org/view.php?id=CVE-2006-1017
07 Mar 2006 — The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. • http://bugs.php.net/bug.php?id=37265 •