← Retour aux CVEs
CVE-2006-5465
N/ADescription
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
Details CVE
Score CVSS v3.1N/A
Publie11/4/2006
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
php:php
References
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P(secalert@redhat.com)
http://docs.info.apple.com/article.html?artnum=304829(secalert@redhat.com)
http://issues.rpath.com/browse/RPL-761(secalert@redhat.com)
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2006-0736.html(secalert@redhat.com)
http://secunia.com/advisories/22653(secalert@redhat.com)
http://secunia.com/advisories/22685(secalert@redhat.com)
http://secunia.com/advisories/22688(secalert@redhat.com)
http://secunia.com/advisories/22693(secalert@redhat.com)
http://secunia.com/advisories/22713(secalert@redhat.com)
http://secunia.com/advisories/22753(secalert@redhat.com)
http://secunia.com/advisories/22759(secalert@redhat.com)
http://secunia.com/advisories/22779(secalert@redhat.com)
http://secunia.com/advisories/22881(secalert@redhat.com)
http://secunia.com/advisories/22929(secalert@redhat.com)
http://secunia.com/advisories/23139(secalert@redhat.com)
http://secunia.com/advisories/23155(secalert@redhat.com)
http://secunia.com/advisories/23247(secalert@redhat.com)
http://secunia.com/advisories/24606(secalert@redhat.com)
http://secunia.com/advisories/25047(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200703-21.xml(secalert@redhat.com)
http://securitytracker.com/id?1017152(secalert@redhat.com)
http://securitytracker.com/id?1017296(secalert@redhat.com)
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm(secalert@redhat.com)
http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html(secalert@redhat.com)
http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml(secalert@redhat.com)
http://www.debian.org/security/2006/dsa-1206(secalert@redhat.com)
http://www.hardened-php.net/advisory_132006.138.html(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:196(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2006_67_php.html(secalert@redhat.com)
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html(secalert@redhat.com)
http://www.php.net/releases/5_2_0.php(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0730.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0731.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/450431/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/451098/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/453024/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/20879(secalert@redhat.com)
http://www.trustix.org/errata/2006/0061/(secalert@redhat.com)
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt(secalert@redhat.com)
http://www.ubuntu.com/usn/usn-375-1(secalert@redhat.com)
http://www.us-cert.gov/cas/techalerts/TA06-333A.html(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/4317(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/4749(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/4750(secalert@redhat.com)
http://www.vupen.com/english/advisories/2007/1546(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240(secalert@redhat.com)
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P(af854a3a-2127-422b-91ae-364da2661108)
http://docs.info.apple.com/article.html?artnum=304829(af854a3a-2127-422b-91ae-364da2661108)
http://issues.rpath.com/browse/RPL-761(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0736.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22653(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22685(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22688(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22693(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22713(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22753(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22759(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22779(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22881(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22929(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/23139(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/23155(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/23247(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24606(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25047(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200703-21.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1017152(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1017296(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-245.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.cisco.com/en/US/products/products_security_response09186a008082c4fe.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.cisco.com/warp/public/707/cisco-air-20070425-http.shtml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1206(af854a3a-2127-422b-91ae-364da2661108)
http://www.hardened-php.net/advisory_132006.138.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:196(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_67_php.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.028.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/releases/5_2_0.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0730.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0731.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/450431/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/451098/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/453024/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/20879(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0061/(af854a3a-2127-422b-91ae-364da2661108)
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-375-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA06-333A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4317(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4749(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4750(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/1546(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29971(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10240(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.