語系:
http://www.php.net/ChangeLog-5.php#5.2.7
http://www.php.net/releases/5_2_7.php
https://www.openwall.com/lists/oss-security/2008/08/08/2
http://cxsecurity.com/issue/WLB-2008110058
http://cxsecurity.com/issue/WLB-2008110041
http://cxsecurity.com/issue/WLB-2008120011
https://seclists.org/fulldisclosure/2008/Jun/237
https://seclists.org/fulldisclosure/2008/Jun/238
https://www.openwall.com/lists/oss-security/2008/08/13/8
https://seclists.org/fulldisclosure/2008/Nov/674
https://seclists.org/fulldisclosure/2008/Dec/90
https://bugs.php.net/bug.php?id=42862
嚴重性: High
ID: 35043
檔案名稱: php_5_2_7.nasl
版本: 1.32
類型: remote
系列: CGI abuses
已發布: 2008/12/5
已更新: 2022/4/11
組態: 啟用徹底檢查
支援的感應器: Nessus
風險因素: Medium
分數: 6.7
風險因素: High
基本分數: 7.5
時間分數: 5.9
媒介: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: cpe:/a:php:php
必要的 KB 項目: www/PHP
可輕鬆利用: No exploit is required
修補程式發佈日期: 2008/12/4
弱點發布日期: 2008/6/19
CVE: CVE-2008-2371, CVE-2008-2665, CVE-2008-2666, CVE-2008-2829, CVE-2008-3658, CVE-2008-3659, CVE-2008-3660, CVE-2008-5557, CVE-2008-5624, CVE-2008-5625, CVE-2008-5658, CVE-2008-7068, CVE-2014-8626
BID: 30649, 31612, 32948, 70928, 32625, 29797, 29796, 32688, 32383, 29829, 30087