Critical php security update, php-cgi vulnerabilit
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Apache + PHP 5.x Remote Code Execution Python Exploit #2 | 31 Oct 201300:00 | – | packetstorm |
![]() | PHP CGI Argument Injection | 6 May 201200:00 | – | packetstorm |
![]() | PHP-CGI Argument Injection Remote Code Execution | 24 Dec 201200:00 | – | packetstorm |
![]() | PHP CGI Argument Injection | 22 May 201200:00 | – | packetstorm |
![]() | Apache / PHP Remote Command Execution | 29 Oct 201300:00 | – | packetstorm |
![]() | PHP CGI Injection | 6 May 201200:00 | – | packetstorm |
![]() | CVE-2012-1823 | 11 May 201200:00 | – | attackerkb |
![]() | CVE-2013-4878 | 18 Jul 201300:00 | – | attackerkb |
![]() | PHP-CGI Query String Parameter Vulnerability | 25 Mar 202200:00 | – | cisa_kev |
![]() | PHP-CGI OS Command Injection Vulnerability | 12 Jun 202400:00 | – | cisa_kev |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | php-dba | 5.1.6-34.el5_8 | php-dba-5.1.6-34.el5_8.i386.rpm |
RedHat | 5 | s390x | php | 5.1.6-34.el5_8 | php-5.1.6-34.el5_8.s390x.rpm |
RedHat | 5 | ppc | php-ncurses | 5.1.6-34.el5_8 | php-ncurses-5.1.6-34.el5_8.ppc.rpm |
RedHat | 6 | x86_64 | php-mysql | 5.3.3-3.el6_2.8 | php-mysql-5.3.3-3.el6_2.8.x86_64.rpm |
RedHat | 6 | i686 | php-xmlrpc | 5.3.3-3.el6_2.8 | php-xmlrpc-5.3.3-3.el6_2.8.i686.rpm |
RedHat | 5 | ia64 | php-devel | 5.1.6-34.el5_8 | php-devel-5.1.6-34.el5_8.ia64.rpm |
RedHat | 5 | x86_64 | php-xml | 5.1.6-34.el5_8 | php-xml-5.1.6-34.el5_8.x86_64.rpm |
RedHat | 6 | i686 | php-dba | 5.3.3-3.el6_2.8 | php-dba-5.3.3-3.el6_2.8.i686.rpm |
RedHat | 6 | s390x | php-pgsql | 5.3.3-3.el6_2.8 | php-pgsql-5.3.3-3.el6_2.8.s390x.rpm |
RedHat | 6 | x86_64 | php-devel | 5.3.3-3.el6_2.8 | php-devel-5.3.3-3.el6_2.8.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo