Lucene search

K

(RHSA-2013:1063) Critical: php security update

🗓️ 15 Jul 2013 00:00:00Reported by RedHatType 
redhat
 redhat
🔗 access.redhat.com👁 34 Views

Critical security update for PHP due to buffer overflow flaw in parsing deeply nested XML document

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Packages
ReporterTitlePublishedViews
Family
Prion
Memory corruption
13 Jul 201313:10
prion
OpenVAS
RedHat Update for php RHSA-2013:1049-01
6 Sep 201300:00
openvas
OpenVAS
Fedora Update for php FEDORA-2013-12977
20 Aug 201300:00
openvas
OpenVAS
Debian Security Advisory DSA 2723-1 (php5 - heap corruption)
17 Jul 201300:00
openvas
OpenVAS
Mageia: Security Advisory (MGASA-2013-0216)
28 Jan 202200:00
openvas
OpenVAS
Mageia: Security Advisory (MGASA-2013-0233)
28 Jan 202200:00
openvas
OpenVAS
CentOS Update for php CESA-2013:1049 centos6
16 Jul 201300:00
openvas
OpenVAS
CentOS Update for php53 CESA-2013:1050 centos5
16 Jul 201300:00
openvas
OpenVAS
RedHat Update for php53 RHSA-2013:1050-01
6 Sep 201300:00
openvas
OpenVAS
Amazon Linux: Security Advisory (ALAS-2013-212)
8 Sep 201500:00
openvas
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
RedHat4ia64php-pgsql4.3.9-3.37.el4php-pgsql-4.3.9-3.37.el4.ia64.rpm
RedHat4ia64php-xmlrpc4.3.9-3.37.el4php-xmlrpc-4.3.9-3.37.el4.ia64.rpm
RedHat4i386php-imap4.3.9-3.37.el4php-imap-4.3.9-3.37.el4.i386.rpm
RedHat4x86_64php-imap4.3.9-3.37.el4php-imap-4.3.9-3.37.el4.x86_64.rpm
RedHat4x86_64php-gd4.3.9-3.37.el4php-gd-4.3.9-3.37.el4.x86_64.rpm
RedHat4i386php-snmp4.3.9-3.37.el4php-snmp-4.3.9-3.37.el4.i386.rpm
RedHat4x86_64php-xmlrpc4.3.9-3.37.el4php-xmlrpc-4.3.9-3.37.el4.x86_64.rpm
RedHat4ia64php-snmp4.3.9-3.37.el4php-snmp-4.3.9-3.37.el4.ia64.rpm
RedHat4i386php-odbc4.3.9-3.37.el4php-odbc-4.3.9-3.37.el4.i386.rpm
RedHat4ia64php-gd4.3.9-3.37.el4php-gd-4.3.9-3.37.el4.ia64.rpm
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo