php vulnerable to arbitrary command execution due to improperly escaping multi-byte character
Reporter | Title | Published | Views | Family All 88 |
---|---|---|---|---|
![]() | CVE-2008-2051 | 5 May 200817:20 | – | nvd |
![]() | CVE-2008-2051 | 5 May 200817:20 | – | cve |
![]() | CVE-2008-2051 | 5 May 200800:00 | – | ubuntucve |
![]() | Design/Logic Flaw | 5 May 200817:20 | – | prion |
![]() | CVE-2008-2051 | 5 May 200817:00 | – | cvelist |
![]() | Slackware 10.2 / 11.0 / 12.0 / 12.1 / current : php (SSA:2008-128-01) | 28 May 200800:00 | – | nessus |
![]() | Debian DSA-1572-1 : php5 - several vulnerabilities | 13 May 200800:00 | – | nessus |
![]() | openSUSE Security Update : apache2-mod_php5 (apache2-mod_php5-61) | 21 Jul 200900:00 | – | nessus |
![]() | openSUSE 10 Security Update : apache2-mod_php5 (apache2-mod_php5-5379) | 2 Jul 200800:00 | – | nessus |
![]() | Fedora 9 : php-5.2.6-2.fc9 (2008-3606) | 24 Jun 200800:00 | – | nessus |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/archive/1/492535/100/0/threaded |
securityfocus | www.securityfocus.com/archive/1/492671/100/0/threaded |
securityfocus | www.securityfocus.com/bid/29009 |
secunia | www.secunia.com/advisories/30048 |
secunia | www.secunia.com/advisories/30083 |
secunia | www.secunia.com/advisories/30158 |
secunia | www.secunia.com/advisories/30288 |
secunia | www.secunia.com/advisories/30345 |
secunia | www.secunia.com/advisories/30411 |
secunia | www.secunia.com/advisories/30757 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo