Important php security update with denial of service and code execution vulnerabilitie
Reporter | Title | Published | Views | Family All 114 |
---|---|---|---|---|
![]() | RHEL 2.1 : php (RHSA-2007:0154) | 19 Apr 200700:00 | – | nessus |
![]() | CentOS 3 / 4 : php (CESA-2007:0155) | 19 Apr 200700:00 | – | nessus |
![]() | Oracle Linux 3 / 4 : php (ELSA-2007-0155) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 3 / 4 : php (RHSA-2007:0155) | 19 Apr 200700:00 | – | nessus |
![]() | Debian DSA-1282-1 : php4 - several vulnerabilities | 30 Apr 200700:00 | – | nessus |
![]() | F5 Networks BIG-IP : Multiple PHP vulnerabilities (SOL7859) | 10 Oct 201400:00 | – | nessus |
![]() | GLSA-200705-19 : PHP: Multiple vulnerabilities | 29 May 200700:00 | – | nessus |
![]() | Fedora Core 6 : php-5.1.6-3.5.fc6 (2007-415) | 19 Apr 200700:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : php (MDKSA-2007:090) | 23 Apr 200900:00 | – | nessus |
![]() | Fedora Core 5 : php-5.1.6-1.5 (2007-455) | 30 Apr 200700:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | i386 | php-devel | 4.1.2-2.17 | php-devel-4.1.2-2.17.i386.rpm |
RedHat | any | i386 | php-manual | 4.1.2-2.17 | php-manual-4.1.2-2.17.i386.rpm |
RedHat | any | ia64 | php-manual | 4.1.2-2.17 | php-manual-4.1.2-2.17.ia64.rpm |
RedHat | any | ia64 | php-odbc | 4.1.2-2.17 | php-odbc-4.1.2-2.17.ia64.rpm |
RedHat | any | i386 | php | 4.1.2-2.17 | php-4.1.2-2.17.i386.rpm |
RedHat | any | i386 | php-imap | 4.1.2-2.17 | php-imap-4.1.2-2.17.i386.rpm |
RedHat | any | ia64 | php-devel | 4.1.2-2.17 | php-devel-4.1.2-2.17.ia64.rpm |
RedHat | any | ia64 | php-ldap | 4.1.2-2.17 | php-ldap-4.1.2-2.17.ia64.rpm |
RedHat | any | i386 | php-pgsql | 4.1.2-2.17 | php-pgsql-4.1.2-2.17.i386.rpm |
RedHat | any | ia64 | php | 4.1.2-2.17 | php-4.1.2-2.17.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo