Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58311
Category:CGI abuses
Title:PHP < 4.4.3/5.1.3 Multiple Vulnerabilities
Summary:NOSUMMARY
Description:Description:

The remote host is vulnerable to numerous vulnerabilities as
indicated in the referenced security advisories.

Versions up to and including 4.4.2 and 5.1.2 are vulnerable.

Solution : Upgrade to PHP 5.1.3/4.4.3 or later.

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: BugTraq ID: 17362
BugTraq ID: 17439
BugTraq ID: 22766
BugTraq ID: 18116
BugTraq ID: 18645
Common Vulnerability Exposure (CVE) ID: CVE-2006-0996
http://www.securityfocus.com/bid/17362
http://security.gentoo.org/glsa/glsa-200605-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:074
http://marc.info/?l=php-cvs&m=114374620416389&w=2
http://www.osvdb.org/24484
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997
RedHat Security Advisories: RHSA-2006:0276
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
RedHat Security Advisories: RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://securitytracker.com/id?1015879
http://secunia.com/advisories/19599
http://secunia.com/advisories/19775
http://secunia.com/advisories/19832
http://secunia.com/advisories/19979
http://secunia.com/advisories/20052
http://secunia.com/advisories/20210
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21125
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
SGI Security Advisory: 20060501-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://securityreason.com/securityalert/675
http://securityreason.com/achievement_securityalert/34
SuSE Security Announcement: SUSE-SA:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/05-05-2006.html
http://www.ubuntu.com/usn/usn-320-1
http://www.vupen.com/english/advisories/2006/1290
http://www.vupen.com/english/advisories/2006/2685
XForce ISS Database: php-phpinfo-long-array-xss(25702)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25702
Common Vulnerability Exposure (CVE) ID: CVE-2006-1494
http://www.securityfocus.com/bid/17439
Bugtraq: 20061005 rPSA-2006-0182-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/447866/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10196
http://www.redhat.com/support/errata/RHSA-2006-0567.html
http://www.redhat.com/support/errata/RHSA-2006-0568.html
http://securitytracker.com/id?1015881
http://secunia.com/advisories/21031
http://secunia.com/advisories/21135
http://secunia.com/advisories/21202
http://secunia.com/advisories/21723
http://secunia.com/advisories/22225
SGI Security Advisory: 20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://securityreason.com/securityalert/677
http://securityreason.com/achievement_securityalert/36
XForce ISS Database: php-tempnam-directory-traversal(25705)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25705
Common Vulnerability Exposure (CVE) ID: CVE-2006-1549
http://www.securityfocus.com/bid/22766
Bugtraq: 20060409 function *() php/apache Crash PHP 4.4.2 and 5.1.2 (Google Search)
http://www.securityfocus.com/archive/1/430453/100/0/threaded
Bugtraq: 20060412 Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 (Google Search)
http://www.securityfocus.com/archive/1/430598/100/0/threaded
http://www.securityfocus.com/archive/1/430742/100/0/threaded
Bugtraq: 20060414 Re: Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 (Google Search)
http://www.securityfocus.com/archive/1/431018/100/0/threaded
http://www.php-security.org/MOPB/MOPB-02-2007.html
http://www.osvdb.org/24485
http://securitytracker.com/id?1015880
http://securityreason.com/securityalert/2312
http://securityreason.com/securityalert/676
http://securityreason.com/achievement_securityalert/35
XForce ISS Database: php-function-dos(25704)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25704
Common Vulnerability Exposure (CVE) ID: CVE-2006-1608
Bugtraq: 20060409 copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 (Google Search)
http://www.securityfocus.com/archive/1/430461/100/0/threaded
Bugtraq: 20060718 new shell bypass safe mode (Google Search)
http://www.securityfocus.com/archive/1/440869/100/0/threaded
Bugtraq: 20060723 Re: new shell bypass safe mode (Google Search)
http://www.securityfocus.com/archive/1/441210/100/0/threaded
http://www.osvdb.org/24487
http://securitytracker.com/id?1015882
http://securityreason.com/securityalert/678
http://securityreason.com/achievement_securityalert/37
XForce ISS Database: php-copy-safemode-bypass(25706)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25706
Common Vulnerability Exposure (CVE) ID: CVE-2006-1990
1015979
http://securitytracker.com/id?1015979
19803
http://secunia.com/advisories/19803
20052
20060701-01-U
20061005 rPSA-2006-0182-1 php php-mysql php-pgsql
20222
20269
http://secunia.com/advisories/20269
20676
http://secunia.com/advisories/20676
21031
21050
http://secunia.com/advisories/21050
21125
21135
21252
21564
21723
22225
23155
http://secunia.com/advisories/23155
ADV-2006-1500
http://www.vupen.com/english/advisories/2006/1500
ADV-2006-4750
http://www.vupen.com/english/advisories/2006/4750
APPLE-SA-2006-11-28
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
GLSA-200605-08
MDKSA-2006:091
http://www.mandriva.com/security/advisories?name=MDKSA-2006:091
MDKSA-2006:122
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
RHSA-2006:0501
RHSA-2006:0549
RHSA-2006:0568
SUSE-SA:2006:031
http://www.novell.com/linux/security/advisories/2006_31_php.html
TA06-333A
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
USN-320-1
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02
https://issues.rpath.com/browse/RPL-683
oval:org.mitre.oval:def:9696
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696
php-wordwrap-string-bo(26001)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26001
Common Vulnerability Exposure (CVE) ID: CVE-2006-2563
http://www.securityfocus.com/bid/18116
http://securitytracker.com/id?1016175
http://secunia.com/advisories/20337
http://secunia.com/advisories/21847
http://secunia.com/advisories/22039
http://securityreason.com/securityalert/959
http://securityreason.com/achievement_securityalert/39
SuSE Security Announcement: SUSE-SA:2006:052 (Google Search)
http://www.novell.com/linux/security/advisories/2006_52_php.html
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://www.vupen.com/english/advisories/2006/2055
XForce ISS Database: php-curl-safemode-bypass(26764)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26764
Common Vulnerability Exposure (CVE) ID: CVE-2006-3011
http://www.securityfocus.com/bid/18645
http://www.osvdb.org/26827
http://securitytracker.com/id?1016377
http://secunia.com/advisories/20818
http://secunia.com/advisories/21546
http://securityreason.com/securityalert/1129
http://securityreason.com/achievement_securityalert/41
http://www.vupen.com/english/advisories/2006/2523
XForce ISS Database: php-errorlog-safe-mode-bypass(27414)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27414
Common Vulnerability Exposure (CVE) ID: CVE-2006-7205
http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02
http://www.osvdb.org/24945
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.