Executive Summary
Summary | |
---|---|
Title | PHP vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-3045-1 | First vendor Publication | 2016-08-02 |
Vendor | Ubuntu | Last vendor Modification | 2016-08-02 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in PHP. Software Description: - php7.0: HTML-embedded scripting language interpreter - php5: HTML-embedded scripting language interpreter Details: It was discovered that PHP incorrectly handled certain SplMinHeap::compare operations. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-4116) It was discovered that PHP incorrectly handled recursive method calls. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8873) It was discovered that PHP incorrectly validated certain Exception objects when unserializing data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8876) It was discovered that PHP header() function performed insufficient filtering for Internet Explorer. A remote attacker could possibly use this issue to perform a XSS attack. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8935) It was discovered that PHP incorrectly handled certain locale operations. An attacker could use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5093) It was discovered that the PHP php_html_entities() function incorrectly handled certain string lengths. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5094, CVE-2016-5095) It was discovered that the PHP fread() function incorrectly handled certain lengths. An attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5096) It was discovered that the PHP FastCGI Process Manager (FPM) SAPI incorrectly handled memory in the access logging feature. An attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly expose sensitive information. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5114) It was discovered that PHP would not protect applications from contents of the HTTP_PROXY environment variable when based on the contents of the Proxy header from HTTP requests. A remote attacker could possibly use this issue in combination with scripts that honour the HTTP_PROXY variable to redirect outgoing HTTP requests. (CVE-2016-5385) Hans Jerry Illikainen discovered that the PHP bzread() function incorrectly performed error handling. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-5399) It was discovered that certain PHP multibyte string functions incorrectly handled memory. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-5768) It was discovered that the PHP Mcrypt extension incorrectly handled memory. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5769) It was discovered that the PHP garbage collector incorrectly handled certain objects when unserializing malicious data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue was only addressed in Ubuntu Ubuntu 14.04 LTS. (CVE-2016-5771, CVE-2016-5773) It was discovered that PHP incorrectly handled memory when unserializing malicious xml data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5772) It was discovered that the PHP php_url_parse_ex() function incorrectly handled string termination. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-6288) It was discovered that PHP incorrectly handled path lengths when extracting certain Zip archives. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6289) It was discovered that PHP incorrectly handled session deserialization. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6290) It was discovered that PHP incorrectly handled exif headers when processing certain JPEG images. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6291, CVE-2016-6292) It was discovered that PHP incorrectly handled certain locale operations. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6294) It was discovered that the PHP garbage collector incorrectly handled certain objects when unserializing SNMP data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6295) It was discovered that the PHP xmlrpc_encode_request() function incorrectly handled certain lengths. An attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6296) It was discovered that the PHP php_stream_zip_opener() function incorrectly handled memory. An attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-6297) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: Ubuntu 14.04 LTS: Ubuntu 12.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-3045-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
21 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
21 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-416 | Use After Free |
12 % | CWE-125 | Out-of-bounds Read |
8 % | CWE-415 | Double Free |
4 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
4 % | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') (CWE/SANS Top 25) |
4 % | CWE-476 | NULL Pointer Dereference |
4 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
4 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-11-01 | PHP exif_process_IFD_in_MAKERNOTE out of bounds read attempt RuleID : 40297 - Revision : 3 - Type : FILE-IMAGE |
2016-11-01 | PHP exif_process_IFD_in_MAKERNOTE out of bounds read attempt RuleID : 40296 - Revision : 2 - Type : FILE-IMAGE |
2016-11-01 | PHP exif_process_IFD_in_MAKERNOTE out of bounds read attempt RuleID : 40295 - Revision : 2 - Type : FILE-IMAGE |
2016-11-01 | PHP exif_process_IFD_in_MAKERNOTE out of bounds read attempt RuleID : 40294 - Revision : 2 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40248 - Revision : 3 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40247 - Revision : 2 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40246 - Revision : 3 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40245 - Revision : 2 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40244 - Revision : 2 - Type : FILE-IMAGE |
2016-10-20 | PHP exif_process_user_comment null pointer dereference attempt RuleID : 40243 - Revision : 2 - Type : FILE-IMAGE |
2016-10-11 | PHP locale_accept_from_http out of bounds read attempt RuleID : 40046 - Revision : 3 - Type : SERVER-OTHER |
2016-10-11 | PHP unserialize var_hash use-after-free attempt RuleID : 40038 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Revision : 2 - Type : SERVER-WEBAPP |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Revision : 2 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-20 | Name : An enterprise management application installed on the remote host is affected... File : oracle_enterprise_manager_jul_2017_cpu.nasl - Type : ACT_GATHER_INFO |
2017-07-07 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-790.nasl - Type : ACT_GATHER_INFO |
2017-07-05 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-764.nasl - Type : ACT_GATHER_INFO |
2017-06-19 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-1585-1.nasl - Type : ACT_GATHER_INFO |
2017-05-12 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL95432245.nasl - Type : ACT_GATHER_INFO |
2017-05-12 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL30363030.nasl - Type : ACT_GATHER_INFO |
2017-05-02 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1068.nasl - Type : ACT_GATHER_INFO |
2017-05-02 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1067.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2016-1063.nasl - Type : ACT_GATHER_INFO |
2017-03-28 | Name : The remote Debian host is missing a security update. File : debian_DLA-875.nasl - Type : ACT_GATHER_INFO |
2017-03-07 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-304.nasl - Type : ACT_GATHER_INFO |
2016-12-20 | Name : The remote Debian host is missing a security update. File : debian_DLA-749.nasl - Type : ACT_GATHER_INFO |
2016-12-20 | Name : The remote Debian host is missing a security update. File : debian_DLA-749.nasl - Type : ACT_GATHER_INFO |
2016-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161103_php_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-12-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1449.nasl - Type : ACT_GATHER_INFO |
2016-12-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1440.nasl - Type : ACT_GATHER_INFO |
2016-12-05 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2975-1.nasl - Type : ACT_GATHER_INFO |
2016-12-01 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201611-22.nasl - Type : ACT_GATHER_INFO |
2016-11-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2598.nasl - Type : ACT_GATHER_INFO |
2016-11-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2598.nasl - Type : ACT_GATHER_INFO |
2016-11-09 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_6.nasl - Type : ACT_GATHER_INFO |
2016-11-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2598.nasl - Type : ACT_GATHER_INFO |
2016-10-19 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL63712424.nasl - Type : ACT_GATHER_INFO |
2016-10-05 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1156.nasl - Type : ACT_GATHER_INFO |
2016-09-23 | Name : The remote host is missing a macOS update that fixes multiple security vulner... File : macos_10_12.nasl - Type : ACT_GATHER_INFO |
2016-09-19 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2328-1.nasl - Type : ACT_GATHER_INFO |
2016-09-19 | Name : The remote Debian host is missing a security update. File : debian_DLA-628.nasl - Type : ACT_GATHER_INFO |
2016-09-08 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2210-1.nasl - Type : ACT_GATHER_INFO |
2016-09-02 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2080-1.nasl - Type : ACT_GATHER_INFO |
2016-09-02 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2013-1.nasl - Type : ACT_GATHER_INFO |
2016-08-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1638-1.nasl - Type : ACT_GATHER_INFO |
2016-08-29 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1633-1.nasl - Type : ACT_GATHER_INFO |
2016-08-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160811_php_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-08-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-985.nasl - Type : ACT_GATHER_INFO |
2016-08-15 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL43449212.nasl - Type : ACT_GATHER_INFO |
2016-08-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1613.nasl - Type : ACT_GATHER_INFO |
2016-08-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160811_php_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1613.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1609.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1613.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1609.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1609.nasl - Type : ACT_GATHER_INFO |
2016-08-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3059-1.nasl - Type : ACT_GATHER_INFO |
2016-08-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-921.nasl - Type : ACT_GATHER_INFO |
2016-08-04 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL91084571.nasl - Type : ACT_GATHER_INFO |
2016-08-04 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL51390683.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3045-1.nasl - Type : ACT_GATHER_INFO |
2016-08-02 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-728.nasl - Type : ACT_GATHER_INFO |
2016-08-01 | Name : The remote Fedora host is missing a security update. File : fedora_2016-cd2bd0800f.nasl - Type : ACT_GATHER_INFO |
2016-08-01 | Name : The remote Fedora host is missing a security update. File : fedora_2016-8eb11666aa.nasl - Type : ACT_GATHER_INFO |
2016-08-01 | Name : The remote Debian host is missing a security update. File : debian_DLA-569.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-e2c8f5f95a.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-aef8a45afe.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-9c8cf5912c.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-4e7db3d437.nasl - Type : ACT_GATHER_INFO |
2016-07-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_b6402385533b11e6a7bd14dae9d210b8.nasl - Type : ACT_GATHER_INFO |
2016-07-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3631.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_5_38.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_6_24.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_7_0_9.nasl - Type : ACT_GATHER_INFO |
2016-07-25 | Name : The remote web application is affected by a man-in-the-middle vulnerability. File : http_httpoxy.nasl - Type : ACT_ATTACK |
2016-07-22 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-203-02.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote host is missing a Mac OS X update that fixes multiple vulnerabilit... File : macosx_SecUpd2016-004.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote host is missing a Mac OS X security update that fixes multiple vul... File : macosx_10_11_6.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : A PHP application running on the remote web server is affected by a man-in-th... File : drupal_8_1_7.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-ec372bddb9.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3618.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-b08d0b00fc.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-99fbdc5c34.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-79ac80a0d5.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-34a6b65583.nasl - Type : ACT_GATHER_INFO |
2016-07-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-4f3c77ef90.nasl - Type : ACT_GATHER_INFO |
2016-07-14 | Name : The remote Fedora host is missing a security update. File : fedora_2016-65f1ffdc0c.nasl - Type : ACT_GATHER_INFO |
2016-07-14 | Name : The remote Fedora host is missing a security update. File : fedora_2016-6b1938566f.nasl - Type : ACT_GATHER_INFO |
2016-07-14 | Name : The remote Fedora host is missing a security update. File : fedora_2016-b967ac1a74.nasl - Type : ACT_GATHER_INFO |
2016-07-01 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_7_0_8.nasl - Type : ACT_GATHER_INFO |
2016-07-01 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_6_23.nasl - Type : ACT_GATHER_INFO |
2016-07-01 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_5_37.nasl - Type : ACT_GATHER_INFO |
2016-07-01 | Name : The remote Debian host is missing a security update. File : debian_DLA-533.nasl - Type : ACT_GATHER_INFO |
2016-06-28 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-776.nasl - Type : ACT_GATHER_INFO |
2016-06-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_66d77c583b1d11e68e82002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-06-27 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-176-01.nasl - Type : ACT_GATHER_INFO |
2016-06-17 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1581-1.nasl - Type : ACT_GATHER_INFO |
2016-06-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3602.nasl - Type : ACT_GATHER_INFO |
2016-06-14 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-703.nasl - Type : ACT_GATHER_INFO |
2016-06-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-696.nasl - Type : ACT_GATHER_INFO |
2016-06-06 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-707.nasl - Type : ACT_GATHER_INFO |
2016-06-06 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-706.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_7_0_7.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_6_22.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_5_36.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_6b110175246d11e68dd3002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2016-148-03.nasl - Type : ACT_GATHER_INFO |
2016-03-23 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-844.nasl - Type : ACT_GATHER_INFO |
2016-02-10 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_5_31.nasl - Type : ACT_GATHER_INFO |
2015-08-11 | Name : The remote web server uses a version of PHP that is affected by multiple vuln... File : php_5_5_28.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-07-01 09:25:41 |
|
2016-08-09 09:25:37 |
|
2016-08-04 13:25:52 |
|
2016-08-02 21:23:59 |
|