CVE-2006-3017
https://notcve.org/view.php?id=CVE-2006-3017
zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations. • ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0166.html http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&r1=1.87.4.8.2.1&r2=1.87.4.8.2.2 http://cvs.php.net/viewcvs.cgi/Zend/zend_hash.c?hideattic=0&view=log http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/19927 http://secunia.com/advisories/21031 http://secunia.com/advisories/21050 •
CVE-2006-2660
https://notcve.org/view.php?id=CVE-2006-2660
Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename. • http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0209.html http://cvs.php.net/viewcvs.cgi/php-src/NEWS?view=markup&rev=1.1247.2.920.2.134 http://secunia.com/advisories/21125 http://securityreason.com/securityalert/1069 http://securitytracker.com/id?1016271 http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 http://www.securityfocus.com/archive/1/436785/100/0/threaded http://www.ubuntu.com/usn/usn-320-1 https://exchange.xforce.ibmcloud.com/vulnerabilities •
CVE-2006-1494 – PHP 4.x - 'tempnam() open_basedir' Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1494
Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function. • https://www.exploit-db.com/exploits/27595 ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/19599 http://secunia.com/advisories/19775 http://secunia.com/advisories/19979 http://secunia.com/advisories/21031 http://secunia.com/advisories/21125 http://secunia.com/advisories/21135 http://secunia.com/advisories/21202 http://secunia.com/advisories/21252 http://secunia.com/advisor •
CVE-2006-1608 – PHP 4.x - 'copy() Safe_Mode' Bypass
https://notcve.org/view.php?id=CVE-2006-1608
The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI. • https://www.exploit-db.com/exploits/27596 http://secunia.com/advisories/19599 http://secunia.com/advisories/19775 http://secunia.com/advisories/21125 http://securityreason.com/achievement_securityalert/37 http://securityreason.com/securityalert/678 http://securitytracker.com/id?1015882 http://us.php.net/releases/5_1_3.php http://www.mandriva.com/security/advisories?name=MDKSA-2006:074 http://www.osvdb.org/24487 http://www.securityfocus.com/archive/1/430461/100/0/threaded ht •
CVE-2006-1490 – PHP 4.x/5.x - 'Html_Entity_Decode()' Information Disclosure
https://notcve.org/view.php?id=CVE-2006-1490
PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue. NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents. • https://www.exploit-db.com/exploits/27508 ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://bugs.gentoo.org/show_bug.cgi?id=127939 http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?r1=1.112&r2=1.113 http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?view=log http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://rhn.redhat.com/erra •