Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-5557

Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.232
EPSS Ranking 95.7%
CVSS Severity
CVSS v2 Score 10.0
References
Products affected by CVE-2008-5557
  • Php » Php » Version: 4.3.0
    cpe:2.3:a:php:php:4.3.0
  • Php » Php » Version: 4.3.1
    cpe:2.3:a:php:php:4.3.1
  • Php » Php » Version: 4.3.10
    cpe:2.3:a:php:php:4.3.10
  • Php » Php » Version: 4.3.11
    cpe:2.3:a:php:php:4.3.11
  • Php » Php » Version: 4.3.2
    cpe:2.3:a:php:php:4.3.2
  • Php » Php » Version: 4.3.3
    cpe:2.3:a:php:php:4.3.3
  • Php » Php » Version: 4.3.4
    cpe:2.3:a:php:php:4.3.4
  • Php » Php » Version: 4.3.5
    cpe:2.3:a:php:php:4.3.5
  • Php » Php » Version: 4.3.6
    cpe:2.3:a:php:php:4.3.6
  • Php » Php » Version: 4.3.7
    cpe:2.3:a:php:php:4.3.7
  • Php » Php » Version: 4.3.8
    cpe:2.3:a:php:php:4.3.8
  • Php » Php » Version: 4.3.9
    cpe:2.3:a:php:php:4.3.9
  • Php » Php » Version: 4.4.0
    cpe:2.3:a:php:php:4.4.0
  • Php » Php » Version: 4.4.1
    cpe:2.3:a:php:php:4.4.1
  • Php » Php » Version: 4.4.2
    cpe:2.3:a:php:php:4.4.2
  • Php » Php » Version: 4.4.3
    cpe:2.3:a:php:php:4.4.3
  • Php » Php » Version: 4.4.4
    cpe:2.3:a:php:php:4.4.4
  • Php » Php » Version: 4.4.5
    cpe:2.3:a:php:php:4.4.5
  • Php » Php » Version: 4.4.6
    cpe:2.3:a:php:php:4.4.6
  • Php » Php » Version: 4.4.7
    cpe:2.3:a:php:php:4.4.7
  • Php » Php » Version: 4.4.8
    cpe:2.3:a:php:php:4.4.8
  • Php » Php » Version: 4.4.9
    cpe:2.3:a:php:php:4.4.9
  • Php » Php » Version: 5.0.0
    cpe:2.3:a:php:php:5.0.0
  • Php » Php » Version: 5.0.1
    cpe:2.3:a:php:php:5.0.1
  • Php » Php » Version: 5.0.2
    cpe:2.3:a:php:php:5.0.2
  • Php » Php » Version: 5.0.3
    cpe:2.3:a:php:php:5.0.3
  • Php » Php » Version: 5.0.4
    cpe:2.3:a:php:php:5.0.4
  • Php » Php » Version: 5.0.5
    cpe:2.3:a:php:php:5.0.5
  • Php » Php » Version: 5.1.0
    cpe:2.3:a:php:php:5.1.0
  • Php » Php » Version: 5.1.1
    cpe:2.3:a:php:php:5.1.1
  • Php » Php » Version: 5.1.2
    cpe:2.3:a:php:php:5.1.2
  • Php » Php » Version: 5.1.3
    cpe:2.3:a:php:php:5.1.3
  • Php » Php » Version: 5.1.4
    cpe:2.3:a:php:php:5.1.4
  • Php » Php » Version: 5.1.5
    cpe:2.3:a:php:php:5.1.5
  • Php » Php » Version: 5.1.6
    cpe:2.3:a:php:php:5.1.6
  • Php » Php » Version: 5.2.0
    cpe:2.3:a:php:php:5.2.0
  • Php » Php » Version: 5.2.1
    cpe:2.3:a:php:php:5.2.1
  • Php » Php » Version: 5.2.2
    cpe:2.3:a:php:php:5.2.2
  • Php » Php » Version: 5.2.3
    cpe:2.3:a:php:php:5.2.3
  • Php » Php » Version: 5.2.4
    cpe:2.3:a:php:php:5.2.4
  • Php » Php » Version: 5.2.5
    cpe:2.3:a:php:php:5.2.5
  • Php » Php » Version: 5.2.6
    cpe:2.3:a:php:php:5.2.6


Contact Us

Shodan ® - All rights reserved