Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2004-0595

The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.549
EPSS Ranking 97.9%
CVSS Severity
CVSS v2 Score 6.8
References
Products affected by CVE-2004-0595
  • Avaya » Integrated Management » Version: N/A
    cpe:2.3:a:avaya:integrated_management:-
  • Php » Php » Version: 4.0
    cpe:2.3:a:php:php:4.0
  • Php » Php » Version: 4.0.1
    cpe:2.3:a:php:php:4.0.1
  • Php » Php » Version: 4.0.2
    cpe:2.3:a:php:php:4.0.2
  • Php » Php » Version: 4.0.3
    cpe:2.3:a:php:php:4.0.3
  • Php » Php » Version: 4.0.4
    cpe:2.3:a:php:php:4.0.4
  • Php » Php » Version: 4.0.5
    cpe:2.3:a:php:php:4.0.5
  • Php » Php » Version: 4.0.6
    cpe:2.3:a:php:php:4.0.6
  • Php » Php » Version: 4.0.7
    cpe:2.3:a:php:php:4.0.7
  • Php » Php » Version: 4.1.0
    cpe:2.3:a:php:php:4.1.0
  • Php » Php » Version: 4.1.1
    cpe:2.3:a:php:php:4.1.1
  • Php » Php » Version: 4.1.2
    cpe:2.3:a:php:php:4.1.2
  • Php » Php » Version: 4.2.0
    cpe:2.3:a:php:php:4.2.0
  • Php » Php » Version: 4.2.1
    cpe:2.3:a:php:php:4.2.1
  • Php » Php » Version: 4.2.2
    cpe:2.3:a:php:php:4.2.2
  • Php » Php » Version: 4.2.3
    cpe:2.3:a:php:php:4.2.3
  • Php » Php » Version: 4.3.0
    cpe:2.3:a:php:php:4.3.0
  • Php » Php » Version: 4.3.1
    cpe:2.3:a:php:php:4.3.1
  • Php » Php » Version: 4.3.2
    cpe:2.3:a:php:php:4.3.2
  • Php » Php » Version: 4.3.3
    cpe:2.3:a:php:php:4.3.3
  • Php » Php » Version: 4.3.5
    cpe:2.3:a:php:php:4.3.5
  • Php » Php » Version: 4.3.6
    cpe:2.3:a:php:php:4.3.6
  • Php » Php » Version: 4.3.7
    cpe:2.3:a:php:php:4.3.7
  • Php » Php » Version: 5.0
    cpe:2.3:a:php:php:5.0
  • cpe:2.3:h:avaya:converged_communications_server:2.0
  • Avaya » S8300 » Version: r2.0.0
    cpe:2.3:h:avaya:s8300:r2.0.0
  • Avaya » S8300 » Version: r2.0.1
    cpe:2.3:h:avaya:s8300:r2.0.1
  • Avaya » S8500 » Version: r2.0.0
    cpe:2.3:h:avaya:s8500:r2.0.0
  • Avaya » S8500 » Version: r2.0.1
    cpe:2.3:h:avaya:s8500:r2.0.1
  • Avaya » S8700 » Version: r2.0.0
    cpe:2.3:h:avaya:s8700:r2.0.0
  • Avaya » S8700 » Version: r2.0.1
    cpe:2.3:h:avaya:s8700:r2.0.1
  • Redhat » Fedora Core » Version: core_1.0
    cpe:2.3:o:redhat:fedora_core:core_1.0
  • Redhat » Fedora Core » Version: core_2.0
    cpe:2.3:o:redhat:fedora_core:core_2.0
  • Trustix » Secure Linux » Version: 1.5
    cpe:2.3:o:trustix:secure_linux:1.5
  • Trustix » Secure Linux » Version: 2.0
    cpe:2.3:o:trustix:secure_linux:2.0
  • Trustix » Secure Linux » Version: 2.1
    cpe:2.3:o:trustix:secure_linux:2.1


Contact Us

Shodan ® - All rights reserved