php security update for version 8.0.30-1 rebas
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Rocky Linux 9 : php (RLSA-2023:5926) | 24 Oct 202300:00 | – | nessus |
![]() | Oracle Linux 9 : php:8.1 (ELSA-2024-0387) | 25 Jan 202400:00 | – | nessus |
![]() | Oracle Linux 8 : php:8.0 (ELSA-2023-5927) | 24 Oct 202300:00 | – | nessus |
![]() | AlmaLinux 9 : php (ALSA-2023:5926) | 21 Oct 202300:00 | – | nessus |
![]() | Rocky Linux 9 : php:8.1 (RLSA-2024:0387) | 12 Feb 202400:00 | – | nessus |
![]() | RHEL 8 : php:8.0 (RHSA-2023:5927) | 19 Oct 202300:00 | – | nessus |
![]() | Oracle Linux 9 : php (ELSA-2023-5926) | 23 Oct 202300:00 | – | nessus |
![]() | AlmaLinux 8 : php:8.0 (ALSA-2023:5927) | 21 Oct 202300:00 | – | nessus |
![]() | RHEL 9 : php (RHSA-2023:5926) | 19 Oct 202300:00 | – | nessus |
![]() | AlmaLinux 9 : php:8.1 (ALSA-2024:0387) | 26 Jan 202400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
oracle linux | 9 | src | php | 8.0.30-1.el9_2 | php-8.0.30-1.el9_2.src.rpm |
oracle linux | 9 | aarch64 | php | 8.0.30-1.el9_2 | php-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-bcmath | 8.0.30-1.el9_2 | php-bcmath-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-cli | 8.0.30-1.el9_2 | php-cli-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-common | 8.0.30-1.el9_2 | php-common-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-dba | 8.0.30-1.el9_2 | php-dba-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-dbg | 8.0.30-1.el9_2 | php-dbg-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-devel | 8.0.30-1.el9_2 | php-devel-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-embedded | 8.0.30-1.el9_2 | php-embedded-8.0.30-1.el9_2.aarch64.rpm |
oracle linux | 9 | aarch64 | php-enchant | 8.0.30-1.el9_2 | php-enchant-8.0.30-1.el9_2.aarch64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo