(Moderate php security update. Buffer overflow, directory traversal and cross-site scripting flaws found
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | RHSA-2009:0350 Red Hat Security Advisory: php security update | 15 Sep 202417:47 | – | osv |
![]() | RHSA-2009:0338 Red Hat Security Advisory: php security update | 15 Sep 202417:46 | – | osv |
![]() | RHSA-2009:0337 Red Hat Security Advisory: php security update | 15 Sep 202417:46 | – | osv |
![]() | DSA-1789-1 php5 - several vulnerabilities | 4 May 200900:00 | – | osv |
![]() | DSA-1647-1 php5 - several vulnerabilities | 7 Oct 200800:00 | – | osv |
![]() | DTSA-188-1 php5 - several vulnerabilities | 28 Jan 200900:00 | – | osv |
![]() | DSA-1775-1 php-json-ext - denial of service | 20 Apr 200900:00 | – | osv |
![]() | RedHat Security Advisory RHSA-2009:0350 | 15 Apr 200900:00 | – | openvas |
![]() | RedHat Security Advisory RHSA-2009:0350 | 15 Apr 200900:00 | – | openvas |
![]() | CentOS Security Advisory CESA-2009:0338 (php) | 15 Apr 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | x86_64 | php | 5.2.6-4.el5s2 | php-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | x86_64 | php-odbc | 5.2.6-4.el5s2 | php-odbc-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | x86_64 | php-mbstring | 5.2.6-4.el5s2 | php-mbstring-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | x86_64 | php-cli | 5.2.6-4.el5s2 | php-cli-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | i386 | php-ldap | 5.2.6-4.el5s2 | php-ldap-5.2.6-4.el5s2.i386.rpm |
RedHat | 5 | i386 | php-odbc | 5.2.6-4.el5s2 | php-odbc-5.2.6-4.el5s2.i386.rpm |
RedHat | 5 | x86_64 | php-common | 5.2.6-4.el5s2 | php-common-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | x86_64 | php-gd | 5.2.6-4.el5s2 | php-gd-5.2.6-4.el5s2.x86_64.rpm |
RedHat | 5 | i386 | php-mysql | 5.2.6-4.el5s2 | php-mysql-5.2.6-4.el5s2.i386.rpm |
RedHat | 5 | i386 | php-gd | 5.2.6-4.el5s2 | php-gd-5.2.6-4.el5s2.i386.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo