(PHP security update with PEAR XML-RPC Server bug fix
Reporter | Title | Published | Views | Family All 85 |
---|---|---|---|---|
![]() | PEAR XML-RPC, phpxmlrpc: New PHP script injection vulnerability | 24 Aug 200500:00 | – | gentoo |
![]() | phpWebSite: Arbitrary command execution through XML-RPC and SQL injection | 31 Aug 200500:00 | – | gentoo |
![]() | PhpWiki: Arbitrary command execution through XML-RPC | 26 Aug 200500:00 | – | gentoo |
![]() | TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC | 24 Aug 200500:00 | – | gentoo |
![]() | PHP: Vulnerabilities in included PCRE and XML-RPC libraries | 27 Sep 200500:00 | – | gentoo |
![]() | phpGroupWare: Multiple vulnerabilities | 30 Aug 200500:00 | – | gentoo |
![]() | GLSA-200508-14 : TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC | 30 Aug 200500:00 | – | nessus |
![]() | RHEL 4 : php (RHSA-2005:748) | 23 Aug 200500:00 | – | nessus |
![]() | Fedora Core 4 : php-5.0.4-10.4 (2005-810) | 12 Sep 200500:00 | – | nessus |
![]() | Debian DSA-840-1 : drupal - missing input sanitising | 5 Oct 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | s390x | php-xmlrpc | 4.3.9-3.8 | php-xmlrpc-4.3.9-3.8.s390x.rpm |
RedHat | any | ia64 | php-mbstring | 4.3.9-3.8 | php-mbstring-4.3.9-3.8.ia64.rpm |
RedHat | any | i386 | php-pear | 4.3.9-3.8 | php-pear-4.3.9-3.8.i386.rpm |
RedHat | any | i386 | php-devel | 4.3.9-3.8 | php-devel-4.3.9-3.8.i386.rpm |
RedHat | any | ia64 | php-pear | 4.3.9-3.8 | php-pear-4.3.9-3.8.ia64.rpm |
RedHat | any | ia64 | php-devel | 4.3.9-3.8 | php-devel-4.3.9-3.8.ia64.rpm |
RedHat | any | s390x | php | 4.3.9-3.8 | php-4.3.9-3.8.s390x.rpm |
RedHat | any | s390 | php-mbstring | 4.3.9-3.8 | php-mbstring-4.3.9-3.8.s390.rpm |
RedHat | any | ia64 | php | 4.3.9-3.8 | php-4.3.9-3.8.ia64.rpm |
RedHat | any | s390x | php-snmp | 4.3.9-3.8 | php-snmp-4.3.9-3.8.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo