Language:
http://www.php.net/ChangeLog-5.php#5.5.14
https://bugs.php.net/bug.php?id=67072
https://bugs.php.net/bug.php?id=67326
https://bugs.php.net/bug.php?id=67349
https://bugs.php.net/bug.php?id=67390
https://bugs.php.net/bug.php?id=67397
https://bugs.php.net/bug.php?id=67410
https://bugs.php.net/bug.php?id=67411
https://bugs.php.net/bug.php?id=67412
https://bugs.php.net/bug.php?id=67413
https://bugs.php.net/bug.php?id=67432
https://bugs.php.net/bug.php?id=67492
https://bugs.php.net/bug.php?id=67498
https://seclists.org/oss-sec/2014/q3/29
https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html
Severity: High
ID: 76282
File Name: php_5_5_14.nasl
Version: 1.21
Type: remote
Family: CGI abuses
Published: 6/27/2014
Updated: 5/31/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 6.6
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2014-3515
CPE: cpe:/a:php:php
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 6/26/2014
Vulnerability Publication Date: 6/26/2014
CVE: CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3515, CVE-2014-3981, CVE-2014-4049, CVE-2014-4721
BID: 67837, 68007, 68120, 68237, 68238, 68239, 68241, 68243, 68423, 68550