The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
avaya converged communications server 2.0 |
||
redhat fedora core core_1.0 |
||
redhat fedora core core_2.0 |
||
trustix secure linux 1.5 |
||
trustix secure linux 2.0 |
||
trustix secure linux 2.1 |
||
php php 4.0 |
||
php php 4.0.1 |
||
php php 4.1.0 |
||
php php 4.1.1 |
||
php php 4.1.2 |
||
php php 4.3.2 |
||
php php 4.3.3 |
||
avaya s8300 r2.0.0 |
||
avaya s8300 r2.0.1 |
||
php php 4.0.2 |
||
php php 4.0.3 |
||
php php 4.2.0 |
||
php php 4.2.1 |
||
php php 4.3.5 |
||
php php 4.3.6 |
||
avaya s8500 r2.0.0 |
||
avaya s8500 r2.0.1 |
||
php php 4.0.4 |
||
php php 4.0.5 |
||
php php 4.2.2 |
||
php php 4.2.3 |
||
php php 4.3.7 |
||
php php 5.0 |
||
avaya s8700 r2.0.0 |
||
avaya s8700 r2.0.1 |
||
avaya integrated management |
||
php php 4.0.6 |
||
php php 4.0.7 |
||
php php 4.3.0 |
||
php php 4.3.1 |