Drupal Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Drupal development team has published an Drupal security advisory DRUPAL-SA-2005-003 in response to this issue. Users are encouraged to review this advisory and upgrade to a fixed version of the software that it refers to.

Gentoo Linux Affected

Updated:  July 08, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Gentoo Security Project has published the following Gentoo Linux Security Advisories in response to this issue: GLSA 200507-01 GLSA 200507-02 GLSA 200507-06 Users are encouraged to review this advisories and apply the patches that they refer to.

Mandriva, Inc. Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Mandriva Inc. has published Mandriva Linux Security Update Advisories MDKSA-2005:108 and MDKSA-2005:109 in response to this issue. Users are encouraged to review these advisories and apply the patches they refer to.

PEAR XML-RPC Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The PHP Extension and Application Repository (PEAR) project has released version 1.3.1 of the XML_RPC package to address this issue. Users of this software and developers of applications that rely on it are strongly encouraged to upgrade to the fixed version of the code.

phpMyFAQ Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The phpMyFAQ development team has released phpMyFAQ Security Advisory 2005-06-29 in response to this issue. Users are encouraged to review this advisory and upgrade to the fixed version of the software it refers to.

PHPXMLRPC Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The XML-RPC for PHP (a.k.a PHPXMLRPC) project has released version 1.1.1 of the software in response to this issue. Users of this software and developers of applications that rely on it are strongly encouraged to upgrade to the fixed version of the code.

PostNuke Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The PostNuke development team has published PostNuke CMS Security Advisory PNSA 2005-3 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.

Red Hat, Inc. Affected

Updated:  December 22, 2005

Status

Affected

Vendor Statement

Updates are available for Red Hat Enterprise Linux 3 and 4 to correct this issue. Red Hat Enterprise Linux 2.1 was not affected by this issue. New php packages along with our advisory are available at the URL below and by using the Red Hat Network 'up2date' tool. Please note that when using the default SELinux "targeted" policy on Red Hat Enterprise Linux 4, the impact of this issue is reduced since the scripts executed by PHP are constrained within the httpd_sys_script_t security context. http://rhn.redhat.com/errata/RHSA-2005-564.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Serendipity Affected

Updated:  July 08, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Serendipity Weblog System developers have published a fixed version of the software (version 0.8.2) and a security announcement in response to this issue. Users are encouraged to review the announcement and upgrade to the fixed version of the software that it describes.

Trustix Secure Linux Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Trustix Security Team has published Trustix Secure Linux Advisory #2005-0031 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.

Ubuntu Linux Affected

Updated:  July 08, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Ubuntu development team has published Ubuntu Security Notices USN-147-1 and USN-147-2 in response to this issue. Users are encouraged to review these notices and apply the patches they refer to.

WordPress Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The WordPress development team has released WordPress version 1.5.1.3 in response to this issue. Users are encouraged to upgrade to this fixed version of the software.

XOOPS Affected

Updated:  July 06, 2005

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The XOOPS development team has released XOOPS version 2.0.13 in response to this issue. Users are encouraged to upgrade to this fixed version of the software.

View all 13 vendors View less vendors