Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Drupal development team has published an Drupal security advisory DRUPAL-SA-2005-003 in response to this issue. Users are encouraged to review this advisory and upgrade to a fixed version of the software that it refers to.
Updated: July 08, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Gentoo Security Project has published the following Gentoo Linux Security Advisories in response to this issue: GLSA 200507-01 GLSA 200507-02 GLSA 200507-06 Users are encouraged to review this advisories and apply the patches that they refer to.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Mandriva Inc. has published Mandriva Linux Security Update Advisories MDKSA-2005:108 and MDKSA-2005:109 in response to this issue. Users are encouraged to review these advisories and apply the patches they refer to.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The PHP Extension and Application Repository (PEAR) project has released version 1.3.1 of the XML_RPC package to address this issue. Users of this software and developers of applications that rely on it are strongly encouraged to upgrade to the fixed version of the code.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The phpMyFAQ development team has released phpMyFAQ Security Advisory 2005-06-29 in response to this issue. Users are encouraged to review this advisory and upgrade to the fixed version of the software it refers to.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The XML-RPC for PHP (a.k.a PHPXMLRPC) project has released version 1.1.1 of the software in response to this issue. Users of this software and developers of applications that rely on it are strongly encouraged to upgrade to the fixed version of the code.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The PostNuke development team has published PostNuke CMS Security Advisory PNSA 2005-3 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Updated: December 22, 2005
Affected
Updates are available for Red Hat Enterprise Linux 3 and 4 to correct this issue. Red Hat Enterprise Linux 2.1 was not affected by this issue. New php packages along with our advisory are available at the URL below and by using the Red Hat Network 'up2date' tool. Please note that when using the default SELinux "targeted" policy on Red Hat Enterprise Linux 4, the impact of this issue is reduced since the scripts executed by PHP are constrained within the httpd_sys_script_t security context. http://rhn.redhat.com/errata/RHSA-2005-564.html
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 08, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Serendipity Weblog System developers have published a fixed version of the software (version 0.8.2) and a security announcement in response to this issue. Users are encouraged to review the announcement and upgrade to the fixed version of the software that it describes.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Trustix Security Team has published Trustix Secure Linux Advisory #2005-0031 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Updated: July 08, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Ubuntu development team has published Ubuntu Security Notices USN-147-1 and USN-147-2 in response to this issue. Users are encouraged to review these notices and apply the patches they refer to.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The WordPress development team has released WordPress version 1.5.1.3 in response to this issue. Users are encouraged to upgrade to this fixed version of the software.
Updated: July 06, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The XOOPS development team has released XOOPS version 2.0.13 in response to this issue. Users are encouraged to upgrade to this fixed version of the software.