Update php to fix critical stack-based buffer overflow flaw in xmlrpc extension parsing ISO 8601 date
Reporter | Title | Published | Views | Family All 21 |
---|---|---|---|---|
![]() | Stack overflow | 23 Nov 201402:59 | – | prion |
![]() | CVE-2014-8626 | 23 Nov 201402:59 | – | cve |
![]() | RHEL 4 : php (RHSA-2014:1825) | 4 Nov 202400:00 | – | nessus |
![]() | Scientific Linux Security Update : php on SL5.x i386/x86_64 (20141106) | 10 Nov 201400:00 | – | nessus |
![]() | RHEL 5 : php (RHSA-2014:1824) | 7 Nov 201400:00 | – | nessus |
![]() | CentOS 5 : php (CESA-2014:1824) | 7 Nov 201400:00 | – | nessus |
![]() | Oracle Linux 5 : php (ELSA-2014-1824) | 7 Nov 201400:00 | – | nessus |
![]() | PHP 5 < 5.2.7 Multiple Vulnerabilities | 5 Dec 200800:00 | – | nessus |
![]() | CVE-2014-8626 | 23 Nov 201402:00 | – | cvelist |
![]() | RHSA-2014:1825 Red Hat Security Advisory: php security update | 15 Sep 202422:08 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 4 | i386 | php | 4.3.9-3.38.el4 | php-4.3.9-3.38.el4.i386.rpm |
RedHat | 4 | ia64 | php | 4.3.9-3.38.el4 | php-4.3.9-3.38.el4.ia64.rpm |
RedHat | 4 | x86_64 | php | 4.3.9-3.38.el4 | php-4.3.9-3.38.el4.x86_64.rpm |
RedHat | 4 | i386 | php-debuginfo | 4.3.9-3.38.el4 | php-debuginfo-4.3.9-3.38.el4.i386.rpm |
RedHat | 4 | ia64 | php-debuginfo | 4.3.9-3.38.el4 | php-debuginfo-4.3.9-3.38.el4.ia64.rpm |
RedHat | 4 | x86_64 | php-debuginfo | 4.3.9-3.38.el4 | php-debuginfo-4.3.9-3.38.el4.x86_64.rpm |
RedHat | 4 | i386 | php-devel | 4.3.9-3.38.el4 | php-devel-4.3.9-3.38.el4.i386.rpm |
RedHat | 4 | ia64 | php-devel | 4.3.9-3.38.el4 | php-devel-4.3.9-3.38.el4.ia64.rpm |
RedHat | 4 | x86_64 | php-devel | 4.3.9-3.38.el4 | php-devel-4.3.9-3.38.el4.x86_64.rpm |
RedHat | 4 | i386 | php-domxml | 4.3.9-3.38.el4 | php-domxml-4.3.9-3.38.el4.i386.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo