语言:
http://cxsecurity.com/issue/WLB-2008110041
http://cxsecurity.com/issue/WLB-2008110058
http://cxsecurity.com/issue/WLB-2008120011
https://seclists.org/fulldisclosure/2008/Jun/237
https://seclists.org/fulldisclosure/2008/Jun/238
https://www.openwall.com/lists/oss-security/2008/08/08/2
https://www.openwall.com/lists/oss-security/2008/08/13/8
https://seclists.org/fulldisclosure/2008/Nov/674
https://seclists.org/fulldisclosure/2008/Dec/90
https://bugs.php.net/bug.php?id=42862
https://bugs.php.net/bug.php?id=45151
https://bugs.php.net/bug.php?id=45722
严重性: High
ID: 35043
文件名: php_5_2_7.nasl
版本: 1.32
类型: remote
系列: CGI abuses
发布时间: 2008/12/5
最近更新时间: 2022/4/11
配置: 启用全面检查
风险因素: Medium
分数: 6.7
风险因素: High
基本分数: 7.5
时间分数: 5.9
矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: cpe:/a:php:php
必需的 KB 项: www/PHP
易利用性: No exploit is required
补丁发布日期: 2008/12/4
漏洞发布日期: 2008/6/19
CVE: CVE-2008-2371, CVE-2008-2665, CVE-2008-2666, CVE-2008-2829, CVE-2008-3658, CVE-2008-3659, CVE-2008-3660, CVE-2008-5557, CVE-2008-5624, CVE-2008-5625, CVE-2008-5658, CVE-2008-7068, CVE-2014-8626
BID: 29796, 29797, 29829, 30087, 30649, 31612, 32383, 32625, 32688, 32948, 70928