Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.108858
Kategorie:Web application abuses
Titel:PHP < 5.1.2 Multiple Vulnerabilities
Zusammenfassung:PHP is prone to multiple vulnerabilities.
Beschreibung:Summary:
PHP is prone to multiple vulnerabilities.

Affected Software/OS:
PHP before version 5.1.2.

Solution:
Update PHP to version 5.1.2 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 16220
BugTraq ID: 16803
Common Vulnerability Exposure (CVE) ID: CVE-2006-0200
BugTraq ID: 16219
http://www.securityfocus.com/bid/16219
Bugtraq: 20060112 Advisory 02/2006: PHP ext/mysqli Format String Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/421705/100/0/threaded
http://www.hardened-php.net/advisory_022006.113.html
http://securitytracker.com/id?1015485
http://secunia.com/advisories/18431
http://securityreason.com/securityalert/337
http://www.vupen.com/english/advisories/2006/0177
http://www.vupen.com/english/advisories/2006/0369
XForce ISS Database: php-extmysqli-format-string(24095)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24095
Common Vulnerability Exposure (CVE) ID: CVE-2006-0207
http://www.securityfocus.com/bid/16220
Bugtraq: 20060112 Advisory 01/2006: PHP ext/session HTTP Response Splitting Vulnerability (Google Search)
Debian Security Information: DSA-1331 (Google Search)
http://www.debian.org/security/2007/dsa-1331
http://www.gentoo.org/security/en/glsa/glsa-200603-22.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:028
http://www.hardened-php.net/advisory_012006.112.html
http://securitytracker.com/id?1015484
http://secunia.com/advisories/18697
http://secunia.com/advisories/19012
http://secunia.com/advisories/19179
http://secunia.com/advisories/19355
http://secunia.com/advisories/25945
SuSE Security Announcement: SUSE-SR:2006:004 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
https://usn.ubuntu.com/261-1/
XForce ISS Database: php-session-response-splitting(24094)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24094
Common Vulnerability Exposure (CVE) ID: CVE-2006-0208
http://www.securityfocus.com/bid/16803
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178028
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10064
RedHat Security Advisories: RHSA-2006:0276
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
RedHat Security Advisories: RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://secunia.com/advisories/19832
http://secunia.com/advisories/20210
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
SGI Security Advisory: 20060501-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://www.vupen.com/english/advisories/2006/2685
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.