![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0996 – PHP 4.x/5.0/5.1 - PHPInfo Large Input Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2006-0996
10 Apr 2006 — Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed. Vulnerabilidad de XSS en phpinfo (info.c) en PHP 5.1.2 y 4.4.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de variables de array largas incluyendo (1) un gran número de dimensiones o ... • https://www.exploit-db.com/exploits/27564 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-1490 – PHP 4.x/5.x - 'Html_Entity_Decode()' Information Disclosure
https://notcve.org/view.php?id=CVE-2006-1490
29 Mar 2006 — PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents. • https://www.exploit-db.com/exploits/27508 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-1014 – PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1014
07 Mar 2006 — Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE. • https://www.exploit-db.com/exploits/27335 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-1015 – PHP 4.x/5.0/5.1 with Sendmail Mail Function - 'additional_param' Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2006-1015
07 Mar 2006 — Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE. • https://www.exploit-db.com/exploits/27334 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-1017
https://notcve.org/view.php?id=CVE-2006-1017
07 Mar 2006 — The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions. • http://bugs.php.net/bug.php?id=37265 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0207
https://notcve.org/view.php?id=CVE-2006-0207
13 Jan 2006 — Multiple HTTP response splitting vulnerabilities in PHP 5.1.1 allow remote attackers to inject arbitrary HTTP headers via a crafted Set-Cookie header, related to the (1) session extension (aka ext/session) and the (2) header function. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0200
https://notcve.org/view.php?id=CVE-2006-0200
13 Jan 2006 — Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages. • http://secunia.com/advisories/18431 • CWE-134: Use of Externally-Controlled Format String •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0208
https://notcve.org/view.php?id=CVE-2006-0208
13 Jan 2006 — Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-0097 – PHP 4.4.0 - 'mysql_connect function' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-0097
06 Jan 2006 — Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function. • https://www.exploit-db.com/exploits/1406 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-3883
https://notcve.org/view.php?id=CVE-2005-3883
29 Nov 2005 — CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the "To" address argument. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc •