Vulnerability Name:
CVE-2011-1469 (CCN-66190)
Assigned:
2011-02-24
Published:
2011-02-24
Updated:
2018-10-30
Summary:
Unspecified vulnerability in the Streams component in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Low
CVSS v2 Severity:
4.3 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
)
3.6 Low
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Partial
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
)
4.1 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Partial
4.3 Medium
(REDHAT CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
)
3.6 Low
(REDHAT Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Partial
Vulnerability Type:
CWE-noinfo
Vulnerability Consequences:
Denial of Service
References:
Source: CONFIRM
Type: Exploit
http://bugs.php.net/bug.php?id=54092
Source: MITRE
Type: CNA
CVE-2011-1469
Source: APPLE
Type: UNKNOWN
APPLE-SA-2011-10-12-3
Source: CCN
Type: RHSA-2011-1423
Moderate: php53 and php security update
Source: CCN
Type: RHSA-2012-0033
Moderate: php security update
Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT5002
Source: DEBIAN
Type: DSA-2408
php5 -- several vulnerabilities
Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:052
Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:053
Source: CCN
Type: OSVDB ID: 73624
PHP Streams Component HTTP Proxy FTP Wrapper ftp:// URL DoS
Source: CCN
Type: The PHP Group Web site
Version 5.3.6
Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php
Source: REDHAT
Type: UNKNOWN
RHSA-2011:1423
Source: BID
Type: UNKNOWN
46970
Source: CCN
Type: BID-46970
PHP Stream Component Remote Denial of Service Vulnerability
Source: VUPEN
Type: UNKNOWN
ADV-2011-0744
Source: XF
Type: UNKNOWN
php-streams-dos(66190)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:php:php:1.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0b10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.8:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.4:*:windows:*:*:*:*:*
OR
cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.14:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.15:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.16:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.17:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:*:*:*:*:*:*:*:*
(Version <= 5.3.5)
Configuration RedHat 1
:
cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
Configuration RedHat 2
:
cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
Configuration RedHat 3
:
cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*
Configuration RedHat 4
:
cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration RedHat 5
:
cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:1.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:2.0b10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.2::dev:*:*:*:*:*
OR
cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.8:-:*:*:*:*:*:*
OR
cpe:/a:php:php:4.4.9:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.3.5:*:*:*:*:*:*:*
AND
cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux_server_eus:6.1.z:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:20111469
V
CVE-2011-1469
2022-05-20
oval:org.opensuse.security:def:31224
P
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
2021-07-21
oval:org.opensuse.security:def:42077
P
Security update for curl (Moderate)
2021-05-26
oval:org.opensuse.security:def:31150
P
Security update for xorg-x11-server (Important)
2021-04-14
oval:org.opensuse.security:def:31748
P
Security update for openssl (Moderate)
2021-03-24
oval:org.opensuse.security:def:31356
P
Security update for python (Moderate)
2021-03-16
oval:org.opensuse.security:def:35670
P
apache2-mod_php5-5.2.14-0.7.24.1 on GA media (Moderate)
2020-12-03
oval:org.opensuse.security:def:31448
P
Security update for postgresql-init (Moderate)
2020-12-01
oval:org.opensuse.security:def:25233
P
Security update for ImageMagick (Moderate)
2020-12-01
oval:org.opensuse.security:def:32596
P
postgresql on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:25939
P
Security update for gstreamer-0_10-plugins-base (Moderate)
2020-12-01
oval:org.opensuse.security:def:31592
P
Security update for tiff (Moderate)
2020-12-01
oval:org.opensuse.security:def:25425
P
Security update for bluez (Important)
2020-12-01
oval:org.opensuse.security:def:31138
P
Security update for lcms
2020-12-01
oval:org.opensuse.security:def:25997
P
Security update for the Linux Kernel (Important)
2020-12-01
oval:org.opensuse.security:def:31804
P
Security update for ant (Moderate)
2020-12-01
oval:org.opensuse.security:def:25563
P
Security update for xrdp (Important)
2020-12-01
oval:org.opensuse.security:def:26670
P
apache2-mod_php5 on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:31892
P
Security update for expat (Moderate)
2020-12-01
oval:org.opensuse.security:def:25798
P
Security update for flash-player (Critical)
2020-12-01
oval:org.opensuse.security:def:25222
P
Security update for java-1_8_0-openjdk (Important)
2020-12-01
oval:org.opensuse.security:def:31958
P
Security update for gtk2 (Moderate)
2020-12-01
oval:org.opensuse.security:def:25900
P
Security update for the Linux Kernel (Important)
2020-12-01
oval:org.opensuse.security:def:31505
P
Security update for python27 (Moderate)
2020-12-01
oval:org.opensuse.security:def:25297
P
Security update for libX11 (Important)
2020-12-01
oval:org.opensuse.security:def:32635
P
apache2-mod_php5 on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:25953
P
Security update for gcc48 (Moderate)
2020-12-01
oval:org.opensuse.security:def:25506
P
Security update for openexr (Moderate)
2020-12-01
oval:org.opensuse.security:def:31139
P
Security update for less (Moderate)
2020-12-01
oval:org.opensuse.security:def:26635
P
quagga on GA media (Moderate)
2020-12-01
oval:org.opensuse.security:def:31853
P
Security update for coreutils (Important)
2020-12-01
oval:org.opensuse.security:def:25647
P
Security update for freetype2 (Important)
2020-12-01
oval:org.opensuse.security:def:25221
P
Security update for sysstat (Moderate)
2020-12-01
oval:org.opensuse.security:def:31914
P
Security update for gd (Moderate)
2020-12-01
oval:org.opensuse.security:def:25851
P
Security update for freerdp (Moderate)
2020-12-01
oval:org.mitre.oval:def:13955
P
USN-1126-2 -- php5 regressions
2014-06-30
oval:org.mitre.oval:def:13989
P
USN-1126-1 -- php5 vulnerabilities
2014-06-30
oval:org.mitre.oval:def:15188
P
DSA-2408-1 php5 -- several
2014-06-23
oval:org.mitre.oval:def:23207
P
ELSA-2012:0033: php security update (Moderate)
2014-05-26
oval:org.mitre.oval:def:23530
P
ELSA-2011:1423: php53 and php security update (Moderate)
2014-05-26
oval:org.mitre.oval:def:21346
P
RHSA-2012:0033: php security update (Moderate)
2014-02-24
oval:org.mitre.oval:def:21761
P
RHSA-2011:1423: php53 and php security update (Moderate)
2014-02-24
oval:com.redhat.rhsa:def:20120033
P
RHSA-2012:0033: php security update (Moderate)
2012-01-18
oval:com.redhat.rhsa:def:20111423
P
RHSA-2011:1423: php53 and php security update (Moderate)
2011-11-02
BACK
php
php 1.0
php
php 2.0
php
php 2.0b10
php
php 3.0
php
php 3.0.1
php
php 3.0.2
php
php 3.0.3
php
php 3.0.4
php
php 3.0.5
php
php 3.0.6
php
php 3.0.7
php
php 3.0.8
php
php 3.0.9
php
php 3.0.10
php
php 3.0.11
php
php 3.0.12
php
php 3.0.13
php
php 3.0.14
php
php 3.0.15
php
php 3.0.16
php
php 3.0.17
php
php 3.0.18
php
php 4.0
php
php 4.0 beta1
php
php 4.0 beta2
php
php 4.0 beta3
php
php 4.0 beta4
php
php 4.0 beta_4_patch1
php
php 4.0.0
php
php 4.0.1
php
php 4.0.2
php
php 4.0.3
php
php 4.0.4
php
php 4.0.5
php
php 4.0.6
php
php 4.0.7
php
php 4.1.0
php
php 4.1.1
php
php 4.1.2
php
php 4.2.0
php
php 4.2.1
php
php 4.2.2
php
php 4.2.3
php
php 4.3.0
php
php 4.3.1
php
php 4.3.2
php
php 4.3.3
php
php 4.3.4
php
php 4.3.5
php
php 4.3.6
php
php 4.3.7
php
php 4.3.8
php
php 4.3.9
php
php 4.3.10
php
php 4.3.11
php
php 4.4.0
php
php 4.4.1
php
php 4.4.2
php
php 4.4.3
php
php 4.4.4
php
php 4.4.5
php
php 4.4.6
php
php 4.4.7
php
php 4.4.8
php
php 4.4.9
php
php 5.0.0
php
php 5.0.0 beta1
php
php 5.0.0 beta2
php
php 5.0.0 beta3
php
php 5.0.0 beta4
php
php 5.0.0 rc1
php
php 5.0.0 rc2
php
php 5.0.0 rc3
php
php 5.0.1
php
php 5.0.2
php
php 5.0.3
php
php 5.0.4
php
php 5.0.5
php
php 5.1.0
php
php 5.1.1
php
php 5.1.2
php
php 5.1.3
php
php 5.1.4
php
php 5.1.5
php
php 5.1.6
php
php 5.2.0
php
php 5.2.1
php
php 5.2.2
php
php 5.2.3
php
php 5.2.4
php
php 5.2.4
php
php 5.2.5
php
php 5.2.6
php
php 5.2.7
php
php 5.2.8
php
php 5.2.9
php
php 5.2.10
php
php 5.2.11
php
php 5.2.12
php
php 5.2.13
php
php 5.2.14
php
php 5.2.15
php
php 5.2.16
php
php 5.2.17
php
php 5.3.0
php
php 5.3.1
php
php 5.3.2
php
php 5.3.3
php
php 5.3.4
php
php *
php
php 4.0.5
php
php 4.1.1
php
php 4.2.0
php
php 4.2.1
php
php 4.2.3
php
php 4.2.2
php
php 4.3.0
php
php 4.3.4
php
php 4.3.9
php
php 4.3.10
php
php 4.3.11
php
php 4.4.0
php
php 4.4.2
php
php 4.3.3
php
php 4.4.3
php
php 4.4.6
php
php 4.4.5
php
php 4.4.7
php
php 1.0
php
php 2.0
php
php 2.0b10
php
php 3.0
php
php 3.0.1
php
php 3.0.10
php
php 3.0.11
php
php 3.0.12
php
php 3.0.13
php
php 3.0.14
php
php 3.0.15
php
php 3.0.16
php
php 3.0.17
php
php 3.0.18
php
php 3.0.2
php
php 3.0.3
php
php 3.0.4
php
php 3.0.5
php
php 3.0.6
php
php 3.0.7
php
php 3.0.8
php
php 3.0.9
php
php 4.0 beta1
php
php 4.0.0
php
php 4.0.1
php
php 4.0.2
php
php 4.0.3
php
php 4.0.4
php
php 4.0.6
php
php 4.0.7
php
php 4.0 beta1
php
php 4.0 beta2
php
php 4.0 beta3
php
php 4.0 beta4
php
php 4.1.0
php
php 4.1.2
php
php 4.2
php
php 4.3.0
php
php 4.3.1
php
php 4.3.2
php
php 4.3.5
php
php 4.3.6
php
php 4.3.7
php
php 4.3.8
php
php 4.4.1
php
php 4.4.4
php
php 4.4.8
php
php 4.4.9
php
php 5.3.0
php
php 5.3.1
php
php 5.3.2
php
php 5.3.3
php
php 5.3.4
php
php 5.3.5
redhat
enterprise linux 5
redhat
enterprise linux 5
redhat
enterprise linux 6
redhat
enterprise linux 6
redhat
enterprise linux desktop 6
redhat
enterprise linux hpc node 6
redhat
enterprise linux server eus 6.1.z