Update for PHP security vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20141030) | 4 Nov 201400:00 | – | nessus |
![]() | RHEL 6 / 7 : php (RHSA-2014:1767) | 31 Oct 201400:00 | – | nessus |
![]() | Scientific Linux Security Update : php on SL6.x, SL7.x i386/x86_64 (20141030) | 4 Nov 201400:00 | – | nessus |
![]() | RHEL 5 : php53 (RHSA-2014:1768) | 31 Oct 201400:00 | – | nessus |
![]() | Oracle Linux 6 / 7 : php (ELSA-2014-1767) | 31 Oct 201400:00 | – | nessus |
![]() | Debian DLA-94-1 : php5 security update | 26 Mar 201500:00 | – | nessus |
![]() | CentOS 6 / 7 : php (CESA-2014:1767) | 3 Nov 201400:00 | – | nessus |
![]() | Oracle Linux 5 : php53 (ELSA-2014-1768) | 31 Oct 201400:00 | – | nessus |
![]() | CentOS 5 : php53 (CESA-2014:1768) | 3 Nov 201400:00 | – | nessus |
![]() | Ubuntu 14.04 LTS : php5 vulnerabilities (USN-2391-1) | 31 Oct 201400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | ppc64 | php | 5.3.3-40.el6_6 | php-5.3.3-40.el6_6.ppc64.rpm |
RedHat | 7 | s390x | php-ldap | 5.4.16-23.el7_0.3 | php-ldap-5.4.16-23.el7_0.3.s390x.rpm |
RedHat | 7 | ppc64 | php-debuginfo | 5.4.16-23.el7_0.3 | php-debuginfo-5.4.16-23.el7_0.3.ppc64.rpm |
RedHat | 7 | x86_64 | php-pspell | 5.4.16-23.el7_0.3 | php-pspell-5.4.16-23.el7_0.3.x86_64.rpm |
RedHat | 6 | s390x | php-xmlrpc | 5.3.3-40.el6_6 | php-xmlrpc-5.3.3-40.el6_6.s390x.rpm |
RedHat | 6 | s390x | php-fpm | 5.3.3-40.el6_6 | php-fpm-5.3.3-40.el6_6.s390x.rpm |
RedHat | 7 | s390x | php-gd | 5.4.16-23.el7_0.3 | php-gd-5.4.16-23.el7_0.3.s390x.rpm |
RedHat | 7 | s390x | php-cli | 5.4.16-23.el7_0.3 | php-cli-5.4.16-23.el7_0.3.s390x.rpm |
RedHat | 6 | s390x | php-imap | 5.3.3-40.el6_6 | php-imap-5.3.3-40.el6_6.s390x.rpm |
RedHat | 6 | x86_64 | php-fpm | 5.3.3-40.el6_6 | php-fpm-5.3.3-40.el6_6.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo