Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52866
Kategorie:Turbolinux Local Security Tests
Titel:Turbolinux TLSA-2005-50 (php)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to php
announced via advisory TLSA-2005-50.

PHP is an HTML-embedded scripting language.

Multiple vulnerabilities have been discovered in php.

Please refer to the References section.

Solution: Please use the turbopkg (zabom) tool to apply the update.
https://secure1.securityspace.com/smysecure/catid.html?in=TLSA-2005-50

Risk factor : Critical

CVSS Score:
10.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2004-1018
BugTraq ID: 12045
http://www.securityfocus.com/bid/12045
Bugtraq: 20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5 (Google Search)
http://marc.info/?l=bugtraq&m=110314318531298&w=2
Bugtraq: 20041219 PHP shmop.c module permits write of arbitrary memory. (Google Search)
http://www.securityfocus.com/archive/1/384920
https://bugzilla.fedora.us/show_bug.cgi?id=2344
HPdes Security Advisory: HPSBMA01212
http://www.securityfocus.com/advisories/9028
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://www.mandriva.com/security/advisories?name=MDKSA-2005:072
http://www.hardened-php.net/advisories/012004.txt
http://www.osvdb.org/12411
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10949
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
https://www.ubuntu.com/usn/usn-99-1/
XForce ISS Database: php-shmopwrite-outofbounds-memory(18515)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18515
Common Vulnerability Exposure (CVE) ID: CVE-2004-1063
BugTraq ID: 11964
http://www.securityfocus.com/bid/11964
http://www.securityfocus.com/archive/1/384545
Conectiva Linux advisory: CLA-2005:915
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000915
http://www.gentoo.org/security/en/glsa/glsa-200412-14.xml
http://www.osvdb.org/12412
XForce ISS Database: php-safemodeexecdir-restriction-bypass(18511)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18511
Common Vulnerability Exposure (CVE) ID: CVE-2004-1064
https://www.ubuntu.com/usn/usn-99-2/
XForce ISS Database: php-realpath-safemode-bypass(18512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18512
Common Vulnerability Exposure (CVE) ID: CVE-2005-0524
http://lists.apple.com/archives/security-announce/2005/Jun/msg00000.html
http://www.gentoo.org/security/en/glsa/glsa-200504-15.xml
http://www.securityfocus.com/archive/1/394797
http://www.osvdb.org/15183
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9310
http://www.redhat.com/support/errata/RHSA-2005-405.html
http://www.redhat.com/support/errata/RHSA-2005-406.html
http://securitytracker.com/id?1013619
http://secunia.com/advisories/14792
SuSE Security Announcement: SUSE-SA:2005:023 (Google Search)
http://www.vupen.com/english/advisories/2005/0305
XForce ISS Database: php-phphandleiff-dos(19920)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19920
Common Vulnerability Exposure (CVE) ID: CVE-2005-0525
Debian Security Information: DSA-708 (Google Search)
http://www.debian.org/security/2005/dsa-708
Debian Security Information: DSA-729 (Google Search)
http://www.debian.org/security/2005/dsa-729
http://www.osvdb.org/15184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11703
Common Vulnerability Exposure (CVE) ID: CVE-2005-1042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10822
https://usn.ubuntu.com/112-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-1043
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10307
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.