CVE-2006-0201

N/A Unknown
Published: January 13, 2006 Modified: April 16, 2026
View on NVD

Description

Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50, and possibly earlier versions, allows remote attackers to enter false payment entries into the log file via HTTP POST requests to ipn_success.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/18444
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/22378
Source: cve@mitre.org
http://www.securityfocus.com/archive/1/421739
Source: cve@mitre.org
Vendor Advisory
http://www.uinc.ru/articles/vuln/ptpaypal050.shtml
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18444
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/22378
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/421739
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/16218
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.uinc.ru/articles/vuln/ptpaypal050.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/0183
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

paypal