Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
php -- strip_tags cross-site scripting vulnerability
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Insight
Insight
The following packages are affected: mod_php4-twig php4 php4-cgi php4-cli php4-dtc php4-horde php4-nms mod_php4 php5 php5-cgi php5-cli mod_php5 CVE-2004-0595 The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Solution
Solution
Update your system with the appropriate patches or software upgrades. http://security.e-matters.de/advisories/122004.html http://marc.theaimsgroup.com/?l=bugtraq&m=108981589117423 http://www.vuxml.org/freebsd/edf61c61-0f07-11d9-8393-000103ccf9d6.html