Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2006-0908
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:48:56.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "name": "497", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/497" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.waraxe.us/advisory-47.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "name": "497", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/497" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.waraxe.us/advisory-47.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "name": "497", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/497" }, { "name": "http://www.waraxe.us/advisory-47.html", "refsource": "MISC", "url": "http://www.waraxe.us/advisory-47.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0908", "datePublished": "2006-02-28T02:00:00", "dateReserved": "2006-02-28T00:00:00", "dateUpdated": "2024-08-07T16:48:56.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:francisco_burzi:php-nuke:7.8_patched_3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0146C3-38C8-4D16-B4D6-9C16D2BAC635\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \\\"ad_click\\\" word in the query string, as demonstrated via the kala parameter.\"}]", "id": "CVE-2006-0908", "lastModified": "2024-11-21T00:07:37.660", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}", "published": "2006-02-28T02:02:00.000", "references": "[{\"url\": \"http://securityreason.com/securityalert/497\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/426083/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.waraxe.us/advisory-47.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/497\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/426083/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.waraxe.us/advisory-47.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2006-0908\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-02-28T02:02:00.000\",\"lastModified\":\"2024-11-21T00:07:37.660\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \\\"ad_click\\\" word in the query string, as demonstrated via the kala parameter.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:francisco_burzi:php-nuke:7.8_patched_3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0146C3-38C8-4D16-B4D6-9C16D2BAC635\"}]}]}],\"references\":[{\"url\":\"http://securityreason.com/securityalert/497\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/426083/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.waraxe.us/advisory-47.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/426083/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.waraxe.us/advisory-47.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}" } }
ghsa-4w9p-gpm7-68jj
Vulnerability from github
PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the "ad_click" word in the query string, as demonstrated via the kala parameter.
{ "affected": [], "aliases": [ "CVE-2006-0908" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-02-28T02:02:00Z", "severity": "HIGH" }, "details": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter.", "id": "GHSA-4w9p-gpm7-68jj", "modified": "2022-05-01T06:43:48Z", "published": "2022-05-01T06:43:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0908" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/497" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "type": "WEB", "url": "http://www.waraxe.us/advisory-47.html" } ], "schema_version": "1.4.0", "severity": [] }
var-200602-0433
Vulnerability from variot
PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the "ad_click" word in the query string, as demonstrated via the kala parameter. There is an SQL injection vulnerability in PHP-Nuke 7.8 Patched 3.2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1264-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 7th, 2007 http://www.debian.org/security/faq
Package : php4 Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CVE-2007-0906 CVE-2007-0907 CVE-2006-0908 CVE-2007-0909 CVE-2007-0910 CVE-2007-0988
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-0906
It was discovered that an integer overflow in the str_replace()
function could lead to the execution of arbitrary code.
CVE-2007-0907
It was discovered that a buffer underflow in the sapi_header_op()
function could crash the PHP interpreter.
CVE-2007-0908
Stefan Esser discovered that a programming error in the wddx
extension allows information disclosure.
CVE-2007-0909
It was discovered that a format string vulnerability in the
odbc_result_all() functions allows the execution of arbitrary code.
CVE-2007-0910
It was discovered that super-global variables could be overwritten
with session data.
CVE-2007-0988
Stefan Esser discovered that the zend_hash_init() function could
be tricked into an endless loop, allowing denial of service through
resource consumption until a timeout is triggered.
For the stable distribution (sarge) these problems have been fixed in version 4:4.3.10-19.
For the unstable distribution (sid) these problems have been fixed in version 6:4.4.4-9 of php4 and version 5.2.0-9 of php5.
We recommend that you upgrade your php4 packages.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.dsc
Size/MD5 checksum: 1686 65acb80d308f7625e8ec91bb6e29eb29
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.diff.gz
Size/MD5 checksum: 283658 c7c1e0ce432510ed48cd9e135a21a59e
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10.orig.tar.gz
Size/MD5 checksum: 4892209 73f5d1f42e34efa534a09c6091b5a21e
Architecture independent components:
http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.3.10-19_all.deb
Size/MD5 checksum: 250024 8005785eca558044984ca6a66019c02f
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19_all.deb
Size/MD5 checksum: 1142 bd2113b4fc760a9e2d81f67ccf24fcac
Alpha architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_alpha.deb
Size/MD5 checksum: 1701456 14d35e1ca06e0a4339b1b8c885a6bd8f
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_alpha.deb
Size/MD5 checksum: 1699180 4e630e589b36cf5143c772802ef4bafc
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_alpha.deb
Size/MD5 checksum: 3466040 56e187c9cabb148b5681074f2ebcf6d2
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_alpha.deb
Size/MD5 checksum: 1743378 4251694e892c47e59dad839e9ab7a2bc
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_alpha.deb
Size/MD5 checksum: 168220 6595a46953cfa5156cc9dfbebfb57238
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_alpha.deb
Size/MD5 checksum: 18148 9944bd006a811a68280d58707dba0fca
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_alpha.deb
Size/MD5 checksum: 325162 3bf569109326bf57a6db0908864d7d4f
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_alpha.deb
Size/MD5 checksum: 39036 0c174134c0af3da2a44471e0b6a0c0d9
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_alpha.deb
Size/MD5 checksum: 34546 12b9ead7e3d2bc3d586db7c639b25a71
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_alpha.deb
Size/MD5 checksum: 38140 f600d5a57454eac81a59614e396d0a7e
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_alpha.deb
Size/MD5 checksum: 21370 4bc085128a86ebe0b5aff3f33c6b85a5
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_alpha.deb
Size/MD5 checksum: 18206 00041519f22ba5528a61384a1cd8ff25
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_alpha.deb
Size/MD5 checksum: 8340 5faa2f4f4dcc1e6d691fb4e514be1206
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_alpha.deb
Size/MD5 checksum: 22454 8b815228a909700fecf5bc08301605b6
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_alpha.deb
Size/MD5 checksum: 28368 230200935d5b2fe06fc6d01abcf36dc6
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_alpha.deb
Size/MD5 checksum: 7964 a6b4bbd2b60752668b3556cdcbafbf78
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_alpha.deb
Size/MD5 checksum: 13770 76441138f5d1bed6c02f43c5a2c55f0c
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_alpha.deb
Size/MD5 checksum: 23304 d7802126ab8dde4842a72fca318e0424
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_alpha.deb
Size/MD5 checksum: 17886 f341be585bc1342cc87cf814283dc826
AMD64 architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_amd64.deb
Size/MD5 checksum: 1660864 6e8eea11106fd4b06d5d52ab41671003
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_amd64.deb
Size/MD5 checksum: 1658212 e874bb3b60124b4e32732e9b3988c47a
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_amd64.deb
Size/MD5 checksum: 3278508 aac0f56842fe12b91dc7acab71f1be03
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_amd64.deb
Size/MD5 checksum: 1648682 51d7e77dba0ed241fa4bd60f110bcc69
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_amd64.deb
Size/MD5 checksum: 168202 11bf04caba233142536151ff0decf329
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_amd64.deb
Size/MD5 checksum: 17830 6079814a18fab1b42068de9fd1d35a29
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_amd64.deb
Size/MD5 checksum: 325184 9c48363c84aa56f9020d83cef98d8b75
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_amd64.deb
Size/MD5 checksum: 40800 d7ac88bc6c813a747c8ae14681605b35
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_amd64.deb
Size/MD5 checksum: 34280 3b1eb57caa289d1c776f66d6734dee39
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_amd64.deb
Size/MD5 checksum: 37726 014109aa721508ef8b6825e5e9744fac
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_amd64.deb
Size/MD5 checksum: 21416 6b2bf18f6d6db5ee5bf57199639e9870
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_amd64.deb
Size/MD5 checksum: 18886 01b618565ddfce919b8fffba1b336fad
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_amd64.deb
Size/MD5 checksum: 8248 8e56bda6cd19f62248eba36057f9c381
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_amd64.deb
Size/MD5 checksum: 22892 6789a85586205f00dd35f396012d437f
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_amd64.deb
Size/MD5 checksum: 28786 87c5652813f3fc2e636d0de7c6504585
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_amd64.deb
Size/MD5 checksum: 7918 c672b5d5a0dcc8ec56ae29b866909ee7
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_amd64.deb
Size/MD5 checksum: 13684 7996ac194aad7b71aca2ce125f3fe53a
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_amd64.deb
Size/MD5 checksum: 22444 fba5d84d8727dc342a4613cb4f0e5fca
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_amd64.deb
Size/MD5 checksum: 17576 182a9c583741056b4f903071066aa777
ARM architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_arm.deb
Size/MD5 checksum: 1592392 e6c3e603f4b01b8b6472a01fa5c8b149
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_arm.deb
Size/MD5 checksum: 1591960 42fc42a21fafe9980b1cbbd1450b6ebe
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_arm.deb
Size/MD5 checksum: 3172326 44e7b476a2e1f1d6a8a3515aa407dddb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_arm.deb
Size/MD5 checksum: 1593200 0b02299dad2f9a76ee4e11f2d1aba8f1
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_arm.deb
Size/MD5 checksum: 168244 f3c5d8aa86020ded4056f329cb005fe4
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_arm.deb
Size/MD5 checksum: 17652 459d0f476feee2720542be633d56a92b
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_arm.deb
Size/MD5 checksum: 325472 a741698e463184d3b278412189c9c1c2
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_arm.deb
Size/MD5 checksum: 36114 5de247081d931105d8dfcad25dead156
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_arm.deb
Size/MD5 checksum: 31782 8581635d5ffcb20066ad8a17742bf27e
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_arm.deb
Size/MD5 checksum: 35462 da35a74bd0d0db3f7488860e19cfa79d
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_arm.deb
Size/MD5 checksum: 19736 9be69fb529fcf733a91ac24b024a9958
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_arm.deb
Size/MD5 checksum: 17086 5e372f2c55c6db64733458342fd27952
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_arm.deb
Size/MD5 checksum: 7826 6b2e87408132edfc496475409128f949
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_arm.deb
Size/MD5 checksum: 20600 cfad055dec9f682724478910247d974e
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_arm.deb
Size/MD5 checksum: 27330 5c1904d04e7f81349b2d78e1cb7abe3b
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_arm.deb
Size/MD5 checksum: 7644 d6ce09f4c247eb1a69965bc90836df81
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_arm.deb
Size/MD5 checksum: 12790 31d406e601ca65bfc8a2779d0e7cebb4
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_arm.deb
Size/MD5 checksum: 20892 822c073cb45186c6d872afdef513bc90
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_arm.deb
Size/MD5 checksum: 15792 169a0517a14c792e870fcf1b94192276
HP Precision architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_hppa.deb
Size/MD5 checksum: 1759810 d97fae3b1a080a942653878c82cd3ffa
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_hppa.deb
Size/MD5 checksum: 1757570 5c77a078ff8b20ea0402b4a904e0232b
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_hppa.deb
Size/MD5 checksum: 3427812 03e08da005f5f97a6ecd7ab60b5ce68c
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_hppa.deb
Size/MD5 checksum: 1719506 0d0b5c78f2493fa4911db750d517998a
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_hppa.deb
Size/MD5 checksum: 168222 7370b1318dc8c75d7008c255b2002f6a
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_hppa.deb
Size/MD5 checksum: 20028 45464c08d59854305c4a5c9f490d9a63
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_hppa.deb
Size/MD5 checksum: 325312 ecccda98a727a5eaf06a0f0b17185cce
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_hppa.deb
Size/MD5 checksum: 42104 40d2342dcc42b48485573952cffc03f7
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_hppa.deb
Size/MD5 checksum: 37340 88ff9b02b36a7a1c9c2fce8056ef6f15
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_hppa.deb
Size/MD5 checksum: 42648 8f1169758d56f94f0c92142be87d6be0
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_hppa.deb
Size/MD5 checksum: 23000 12fa26227ed747fa3af3ad9efeb8d504
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_hppa.deb
Size/MD5 checksum: 19908 560ad81c6f6db1820c6c572f67cd8152
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_hppa.deb
Size/MD5 checksum: 8698 0656ad921535945f456fb480cc80743f
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_hppa.deb
Size/MD5 checksum: 23596 2fae2e9262934c47965416824c08943b
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_hppa.deb
Size/MD5 checksum: 30172 d2aaabd18fe095a8e106e20505f03ef2
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_hppa.deb
Size/MD5 checksum: 8340 5f2d0de885c904fec8a775afc40b6334
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_hppa.deb
Size/MD5 checksum: 14562 e5dd41449a0e1b35188c7b1946610862
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_hppa.deb
Size/MD5 checksum: 24124 786abb1633ebf48ab459f4e96656efba
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_hppa.deb
Size/MD5 checksum: 18650 afab0398769e8c50b934ee221ea50a5a
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_i386.deb
Size/MD5 checksum: 1614182 612dd25787db4bba5c0b54006c02d50b
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_i386.deb
Size/MD5 checksum: 1612058 9a67d7f1a9aade4bb3eed6b392077bf9
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_i386.deb
Size/MD5 checksum: 3209228 5ac98a8a5649ea2ae6588c4e460ec90c
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_i386.deb
Size/MD5 checksum: 1609646 ec3d17f2b3024ef5ed6e8b21c4286b26
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_i386.deb
Size/MD5 checksum: 168222 9ab456c6fe0ed13f2e591f88a26f81d6
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_i386.deb
Size/MD5 checksum: 17892 92d2e8793dfca9be7576624beb4b0005
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_i386.deb
Size/MD5 checksum: 325192 1a382f30b8ece263b027cfcc35ecfe9c
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_i386.deb
Size/MD5 checksum: 37228 317fd23c3687d861b8b4789c1ea381d1
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_i386.deb
Size/MD5 checksum: 32384 d0655edb839dae2fa8ce269c84e91500
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_i386.deb
Size/MD5 checksum: 37402 95a94b237e75a4c1a64bcb592b351498
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_i386.deb
Size/MD5 checksum: 19958 9cd9bd8707c8b781e9196311f031ec02
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_i386.deb
Size/MD5 checksum: 17672 4b6d7c1eca69b9b218617ac243fa08ad
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_i386.deb
Size/MD5 checksum: 8036 d2efa8096dc22d3c83f8095bb1ab4041
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_i386.deb
Size/MD5 checksum: 21218 042bca1661b147c7be77a69936793904
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_i386.deb
Size/MD5 checksum: 27138 7bbf0a0bd2aee657573d7174f32f1ae7
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_i386.deb
Size/MD5 checksum: 7704 449baf33502b9f48c083dc4b338979dd
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_i386.deb
Size/MD5 checksum: 13152 e1843d982173596abed784d8e7afcafa
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_i386.deb
Size/MD5 checksum: 21382 629931e8d3024d1905071ec9dca9142b
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_i386.deb
Size/MD5 checksum: 16400 d58ba81b22439e5285d448c4316bf5f0
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_ia64.deb
Size/MD5 checksum: 1952256 b11fa1724bd55829b353525d564e47cc
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_ia64.deb
Size/MD5 checksum: 1949710 aa0d4ee3995c997f265c272bc0445e1d
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_ia64.deb
Size/MD5 checksum: 3895870 c29d60863e2331e919339626831fb5a4
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_ia64.deb
Size/MD5 checksum: 1950132 2a7611e476d2afd7f5564e7f4cafac3a
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_ia64.deb
Size/MD5 checksum: 168224 f3c570f637fb69b0d55dbdaaaf882c53
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_ia64.deb
Size/MD5 checksum: 22028 f51f4140ef5d8de1db90bfe06d92d8b8
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_ia64.deb
Size/MD5 checksum: 325338 41a5b1ff824be8410e94d5d3f4eaab5c
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_ia64.deb
Size/MD5 checksum: 50644 a1f0f2f91dfbf84d24446e455e4d0d7c
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_ia64.deb
Size/MD5 checksum: 45256 45155a527b60ebcd117901fc86390d67
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_ia64.deb
Size/MD5 checksum: 48280 cea938e0b3829eeb344939c6116a3274
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_ia64.deb
Size/MD5 checksum: 27042 fc2b4d3e1ae91076548568d8c922037f
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_ia64.deb
Size/MD5 checksum: 22658 f0f5301aa72e4e4ad61bdf90e6594de2
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_ia64.deb
Size/MD5 checksum: 9334 a5c9f81e2bd6bc5ee4c86f5e4d1a0cd1
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_ia64.deb
Size/MD5 checksum: 27602 89ecb1e38d742cff328580cdfe78b8f1
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_ia64.deb
Size/MD5 checksum: 36192 49054c542a4534c12894bfefaf0db1eb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_ia64.deb
Size/MD5 checksum: 9012 d4db9ef8429729ab3051501004082c99
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_ia64.deb
Size/MD5 checksum: 16338 d614825738a19af8ad2500b7c048b51b
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_ia64.deb
Size/MD5 checksum: 28878 6d5df675a23f641f3e1dc5656db9e18a
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_ia64.deb
Size/MD5 checksum: 21912 e76f15111a9b4ccdd94e1f7eac74b088
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_m68k.deb
Size/MD5 checksum: 1580014 f45532aa9784f98ff1525bb005c76b30
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_m68k.deb
Size/MD5 checksum: 1578768 71e652061d4867e6520d448b695f59f7
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_m68k.deb
Size/MD5 checksum: 3080886 6131fe6ae47c2585775714cc64f2b34e
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_m68k.deb
Size/MD5 checksum: 1551076 4aef3676854e4ace8e79d0b740109acd
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_m68k.deb
Size/MD5 checksum: 168268 46923171263033b7d10a73c165baa849
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_m68k.deb
Size/MD5 checksum: 18322 38c451535b6cd68a0e685c4df93cb01e
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_m68k.deb
Size/MD5 checksum: 325808 dd492a00a1d27fa02f2b60e6a481d753
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_m68k.deb
Size/MD5 checksum: 36516 d96b45bb5edaf8edd2282180639ddde8
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_m68k.deb
Size/MD5 checksum: 31006 5647045aff47fb945f5ad2f148e4aede
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_m68k.deb
Size/MD5 checksum: 34926 a7fecf002a308ed790931ecc849f379c
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_m68k.deb
Size/MD5 checksum: 19126 8cd11ec89d611be7674b5117bd48545a
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_m68k.deb
Size/MD5 checksum: 17820 d4e6de681e37bae511f04d4a3aa5bb2f
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_m68k.deb
Size/MD5 checksum: 7964 06ac2494cd27c91d06f40592bdde7871
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_m68k.deb
Size/MD5 checksum: 20694 b290e22f889af582bedf953d3b5e63a2
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_m68k.deb
Size/MD5 checksum: 25852 be18d00b30fbca8ee6f6d9f31c9912b4
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_m68k.deb
Size/MD5 checksum: 7682 7fd30edd98afff26bb2d0fedc5556ac8
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_m68k.deb
Size/MD5 checksum: 12708 f95ada3a476fda3ea9bb36a263dfc19e
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_m68k.deb
Size/MD5 checksum: 20376 6a0f683bd56800a86976d17cf0f90438
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_m68k.deb
Size/MD5 checksum: 15878 4d8a9a99d92b68a7c29f9e4eb48e6c28
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mips.deb
Size/MD5 checksum: 1648626 c09ff318909ac3ec198cf8adb32c3e73
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mips.deb
Size/MD5 checksum: 1646678 8adf0e0321dad42a4a33278b54c1d78a
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mips.deb
Size/MD5 checksum: 3295802 61b55383a87aaecf5825679502a2cd94
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mips.deb
Size/MD5 checksum: 1652658 c094e3ff43dca52eecd39d3d393003f9
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mips.deb
Size/MD5 checksum: 168214 a85518eecd34caeb8b155741fbba6db2
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mips.deb
Size/MD5 checksum: 16826 79bb3b43b38eba4b9cfaed68939fb1ad
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mips.deb
Size/MD5 checksum: 325308 eab0cd699328a69b4f3ef88481985d6c
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mips.deb
Size/MD5 checksum: 35228 de389e3122cd99882eeeaca2fc7b70a3
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mips.deb
Size/MD5 checksum: 31938 87dea075793ed76b812a81963c913aef
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mips.deb
Size/MD5 checksum: 34012 e535078c682091dac1a46f2fb4c0e7c4
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mips.deb
Size/MD5 checksum: 19922 5fe0bc6ac5386626273ae6ee2e66215b
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mips.deb
Size/MD5 checksum: 16476 372a59ba3934e84bb106896a06a03a11
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mips.deb
Size/MD5 checksum: 8120 2b6f78e9419969fdc3ce80bc14d85560
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mips.deb
Size/MD5 checksum: 20504 0ce56458633d1e77f528d4f9b968ce13
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mips.deb
Size/MD5 checksum: 26370 3b393309a1ddb3a67a6018496ca29e6b
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mips.deb
Size/MD5 checksum: 7824 fa7930366a56bb94deaffe6440e94822
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mips.deb
Size/MD5 checksum: 13154 243bf42c3fdd1db4f402de11750c9171
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mips.deb
Size/MD5 checksum: 21654 cd359bf978b6ea51e6eb65a37b60278f
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mips.deb
Size/MD5 checksum: 16188 d4ebc66b677efe3b82a163b62c29aa35
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mipsel.deb
Size/MD5 checksum: 1630640 210a7f2df10febfaa52f2447520df140
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mipsel.deb
Size/MD5 checksum: 1628878 17b584a9e468eb8ede205a2a6878f4b1
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mipsel.deb
Size/MD5 checksum: 3254494 b9a460244d857a77f0d2fc5c1b91894f
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mipsel.deb
Size/MD5 checksum: 1631616 370c7e8cb963ec8f95049dbf5675fe4a
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mipsel.deb
Size/MD5 checksum: 168228 ff3e221bfb5b79f12c10ebd815d88b29
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mipsel.deb
Size/MD5 checksum: 16794 7d960cc9d3e3d362d0f4dba0497eb5b7
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mipsel.deb
Size/MD5 checksum: 325308 f14f5986aa26436d2c6d81707b9987d8
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mipsel.deb
Size/MD5 checksum: 34774 f4f195f0914c0bc882b5143c479c5d24
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mipsel.deb
Size/MD5 checksum: 31666 9f6063fcb54d5379b997ccbc982f65f2
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mipsel.deb
Size/MD5 checksum: 33894 da46922024a02d1023b521cc076cb9cb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mipsel.deb
Size/MD5 checksum: 19800 b86f23fe9c0c7ec4b56c2f767693835f
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mipsel.deb
Size/MD5 checksum: 16384 3e98c62e74e0523e224ad665e604eb78
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mipsel.deb
Size/MD5 checksum: 8092 2ab07f4176f45cbd6a74fbccdb72e9b9
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mipsel.deb
Size/MD5 checksum: 20448 61b72f3ff7cbdec0c7bcf644ae7a42e4
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mipsel.deb
Size/MD5 checksum: 26244 d38dfaa8d7a2565b38edf485c9692212
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mipsel.deb
Size/MD5 checksum: 7778 0aba913f072a2ab411f7f36408838041
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mipsel.deb
Size/MD5 checksum: 13054 2b4f2d929c4a9e8d7aafc439b6a6b4b4
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mipsel.deb
Size/MD5 checksum: 21598 6691aed3e3879ce3884c31bc0c60ae4f
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mipsel.deb
Size/MD5 checksum: 16166 696aa9954b611596fa02b92bb15914d3
PowerPC architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_powerpc.deb
Size/MD5 checksum: 1661280 abad22f7719712b40a4af68503551e21
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_powerpc.deb
Size/MD5 checksum: 1659466 4997003d5edddb161c931ed7f47cfe0a
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_powerpc.deb
Size/MD5 checksum: 3281422 f4bdbbaac2e032788c26bb92dc0da376
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_powerpc.deb
Size/MD5 checksum: 1646784 d84ff6b16873412f6af326995e09ab54
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_powerpc.deb
Size/MD5 checksum: 168220 3f03b4edeffcd89c5cc4127d3a4602ac
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_powerpc.deb
Size/MD5 checksum: 19638 1c874990ecb283c1b23950b016485b50
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_powerpc.deb
Size/MD5 checksum: 325264 15b8a3d2cde40c4aaf31d1925189ab3b
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_powerpc.deb
Size/MD5 checksum: 38646 3945c96a6cd13120e293f60ae820d6d0
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_powerpc.deb
Size/MD5 checksum: 34516 b44d4867447c01db49fe5a9c8e538015
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_powerpc.deb
Size/MD5 checksum: 37770 8fffcc151a281269cccb29559f0b90fc
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_powerpc.deb
Size/MD5 checksum: 21412 9a9663537ca1997bc62cfa4494eba8f3
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_powerpc.deb
Size/MD5 checksum: 19728 9bb25b04bec25cee082c8a8e81c4a19d
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_powerpc.deb
Size/MD5 checksum: 9578 d1bd238a89be2838f5b37d5b2b2a9053
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_powerpc.deb
Size/MD5 checksum: 22604 2935a012ecd74195f44e2213c9999c7a
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_powerpc.deb
Size/MD5 checksum: 28686 46bb5b9d2b6e4258fe2b8dc130ae817c
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_powerpc.deb
Size/MD5 checksum: 9286 2282aefc94808ac2ea1490ecb3ea357f
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_powerpc.deb
Size/MD5 checksum: 14960 68716f24414748d9e621c7f4b0a8e2ea
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_powerpc.deb
Size/MD5 checksum: 23038 193ae7cc97bc2ce1c7033cc14cd6c9c9
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_powerpc.deb
Size/MD5 checksum: 18268 1b032bee509fb88ce36d481c4335418a
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_s390.deb
Size/MD5 checksum: 1709576 c521d1761395fa41e785906cd052a240
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_s390.deb
Size/MD5 checksum: 1708618 cbea3ff2f1f8b42c91f8d1ebe6f295a1
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_s390.deb
Size/MD5 checksum: 3360294 a642ef581d1decdd6b330f2ca62aa3a8
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_s390.deb
Size/MD5 checksum: 1687438 0a16abfb5e945795b598e06fe78821bd
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_s390.deb
Size/MD5 checksum: 168202 088f381bf8f67c76e6a636b1a7420709
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_s390.deb
Size/MD5 checksum: 17842 6f628c4ba64fe7c3e6d1958d8887a032
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_s390.deb
Size/MD5 checksum: 325188 84155d21cc204dd029cb6fe724fd700e
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_s390.deb
Size/MD5 checksum: 41124 f159880550b5c238b0f9cd357763e120
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_s390.deb
Size/MD5 checksum: 33564 560a9717ec712e71a9608ee808017f93
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_s390.deb
Size/MD5 checksum: 37530 58332a689abe020d696accb2c4413bdc
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_s390.deb
Size/MD5 checksum: 21410 8266344d677b30c00ee0575185808c7d
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_s390.deb
Size/MD5 checksum: 17732 1d5a9cdcc554b886836392abacafb37a
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_s390.deb
Size/MD5 checksum: 8394 bf5bfd48a6955ed04cf5eb43c0dbed80
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_s390.deb
Size/MD5 checksum: 22938 558f6a81404ef0097f4d47ef41067acd
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_s390.deb
Size/MD5 checksum: 28874 63b1580d76b438dfe3c6150fca0c983c
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_s390.deb
Size/MD5 checksum: 8048 fb1993cc4170134b46d0a68496971992
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_s390.deb
Size/MD5 checksum: 13894 eeee528a1872d8fd80f92c6459950216
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_s390.deb
Size/MD5 checksum: 22276 ef4cc0b299f757599e7edd178cfbfa95
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_s390.deb
Size/MD5 checksum: 17300 c2d98a377eff47a1fa6376d491378007
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_sparc.deb
Size/MD5 checksum: 1623810 c451cd4693f5a69534681b1eba46e29d
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_sparc.deb
Size/MD5 checksum: 1620886 6f450acb1570c2917c92af4e2ee3462b
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_sparc.deb
Size/MD5 checksum: 3197912 c01cbc381a760f7439f8c8b24a8ee717
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_sparc.deb
Size/MD5 checksum: 1606454 0f3be5c22bb512308e0c668b06e7f25b
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_sparc.deb
Size/MD5 checksum: 168222 d4a0310401f3092a2ea57880bed9911d
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_sparc.deb
Size/MD5 checksum: 18074 160821e02197baf3364906d17eabaa37
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_sparc.deb
Size/MD5 checksum: 325276 b0c1759a579859033b410d34bf443162
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_sparc.deb
Size/MD5 checksum: 36488 cb0f7a642bcc12fdcde900b179ad197f
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_sparc.deb
Size/MD5 checksum: 31948 c31211a42a127e283cf05eea2acb3782
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_sparc.deb
Size/MD5 checksum: 36246 ded59dffa2579d4f3f91be5bc465812e
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_sparc.deb
Size/MD5 checksum: 19278 d852fc1b8146be87d789d46f3fd9531a
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_sparc.deb
Size/MD5 checksum: 17488 c25a9f3959ad71717f22139ee5cc3964
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_sparc.deb
Size/MD5 checksum: 7870 54ef2d007c15936eff7a0968c1bb8411
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_sparc.deb
Size/MD5 checksum: 20672 3aa6f646c2d48e12f274844d882b4cb3
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_sparc.deb
Size/MD5 checksum: 26540 db50bace36223a5fb3165012da864279
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_sparc.deb
Size/MD5 checksum: 7594 a16c41b7273adaf2b72e2cd66a29d856
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_sparc.deb
Size/MD5 checksum: 12846 5f44cba16d1c910b0336c221ab3db31b
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_sparc.deb
Size/MD5 checksum: 20850 f84c554b5e0c31a276444953acdf0d5d
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_sparc.deb
Size/MD5 checksum: 15866 56d9a2ad4d2d94150b7be7deefc6fbd0
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFF7zanXm3vHE4uyloRAr0xAKCLwQ7ji6kxWczRj+WZRIEknn3R4QCgxaVz ShT4FvG6b6xvbngTqwEvkkU= =FElM -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200602-0433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "7.8_patched_3.2" } ], "sources": [ { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:francisco_burzi:php-nuke:7.8_patched_3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-0908" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian", "sources": [ { "db": "PACKETSTORM", "id": "54956" } ], "trust": 0.1 }, "cve": "CVE-2006-0908", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-17016", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-0908", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200602-403", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-17016", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-17016" }, { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter. There is an SQL injection vulnerability in PHP-Nuke 7.8 Patched 3.2. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1264-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nMarch 7th, 2007 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : php4\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CVE-2007-0906 CVE-2007-0907 CVE-2006-0908 CVE-2007-0909 CVE-2007-0910 CVE-2007-0988\n\nSeveral remote vulnerabilities have been discovered in PHP, a server-side,\nHTML-embedded scripting language, which may lead to the execution of\narbitrary code. The Common Vulnerabilities and Exposures project identifies\nthe following problems:\n\nCVE-2007-0906\n\n It was discovered that an integer overflow in the str_replace()\n function could lead to the execution of arbitrary code. \n\nCVE-2007-0907\n\n It was discovered that a buffer underflow in the sapi_header_op()\n function could crash the PHP interpreter. \n\nCVE-2007-0908\n\n Stefan Esser discovered that a programming error in the wddx\n extension allows information disclosure. \n\nCVE-2007-0909\n\n It was discovered that a format string vulnerability in the\n odbc_result_all() functions allows the execution of arbitrary code. \n\nCVE-2007-0910\n\n It was discovered that super-global variables could be overwritten\n with session data. \n\nCVE-2007-0988\n\n Stefan Esser discovered that the zend_hash_init() function could\n be tricked into an endless loop, allowing denial of service through\n resource consumption until a timeout is triggered. \n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 4:4.3.10-19. \n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 6:4.4.4-9 of php4 and version 5.2.0-9 of php5. \n\nWe recommend that you upgrade your php4 packages. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.dsc\n Size/MD5 checksum: 1686 65acb80d308f7625e8ec91bb6e29eb29\n http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.diff.gz\n Size/MD5 checksum: 283658 c7c1e0ce432510ed48cd9e135a21a59e\n http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10.orig.tar.gz\n Size/MD5 checksum: 4892209 73f5d1f42e34efa534a09c6091b5a21e\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.3.10-19_all.deb\n Size/MD5 checksum: 250024 8005785eca558044984ca6a66019c02f\n http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19_all.deb\n Size/MD5 checksum: 1142 bd2113b4fc760a9e2d81f67ccf24fcac\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_alpha.deb\n Size/MD5 checksum: 1701456 14d35e1ca06e0a4339b1b8c885a6bd8f\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_alpha.deb\n Size/MD5 checksum: 1699180 4e630e589b36cf5143c772802ef4bafc\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_alpha.deb\n Size/MD5 checksum: 3466040 56e187c9cabb148b5681074f2ebcf6d2\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_alpha.deb\n Size/MD5 checksum: 1743378 4251694e892c47e59dad839e9ab7a2bc\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_alpha.deb\n Size/MD5 checksum: 168220 6595a46953cfa5156cc9dfbebfb57238\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_alpha.deb\n Size/MD5 checksum: 18148 9944bd006a811a68280d58707dba0fca\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_alpha.deb\n Size/MD5 checksum: 325162 3bf569109326bf57a6db0908864d7d4f\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_alpha.deb\n Size/MD5 checksum: 39036 0c174134c0af3da2a44471e0b6a0c0d9\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_alpha.deb\n Size/MD5 checksum: 34546 12b9ead7e3d2bc3d586db7c639b25a71\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_alpha.deb\n Size/MD5 checksum: 38140 f600d5a57454eac81a59614e396d0a7e\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_alpha.deb\n Size/MD5 checksum: 21370 4bc085128a86ebe0b5aff3f33c6b85a5\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_alpha.deb\n Size/MD5 checksum: 18206 00041519f22ba5528a61384a1cd8ff25\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_alpha.deb\n Size/MD5 checksum: 8340 5faa2f4f4dcc1e6d691fb4e514be1206\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_alpha.deb\n Size/MD5 checksum: 22454 8b815228a909700fecf5bc08301605b6\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_alpha.deb\n Size/MD5 checksum: 28368 230200935d5b2fe06fc6d01abcf36dc6\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_alpha.deb\n Size/MD5 checksum: 7964 a6b4bbd2b60752668b3556cdcbafbf78\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_alpha.deb\n Size/MD5 checksum: 13770 76441138f5d1bed6c02f43c5a2c55f0c\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_alpha.deb\n Size/MD5 checksum: 23304 d7802126ab8dde4842a72fca318e0424\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_alpha.deb\n Size/MD5 checksum: 17886 f341be585bc1342cc87cf814283dc826\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_amd64.deb\n Size/MD5 checksum: 1660864 6e8eea11106fd4b06d5d52ab41671003\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_amd64.deb\n Size/MD5 checksum: 1658212 e874bb3b60124b4e32732e9b3988c47a\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_amd64.deb\n Size/MD5 checksum: 3278508 aac0f56842fe12b91dc7acab71f1be03\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_amd64.deb\n Size/MD5 checksum: 1648682 51d7e77dba0ed241fa4bd60f110bcc69\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_amd64.deb\n Size/MD5 checksum: 168202 11bf04caba233142536151ff0decf329\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_amd64.deb\n Size/MD5 checksum: 17830 6079814a18fab1b42068de9fd1d35a29\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_amd64.deb\n Size/MD5 checksum: 325184 9c48363c84aa56f9020d83cef98d8b75\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_amd64.deb\n Size/MD5 checksum: 40800 d7ac88bc6c813a747c8ae14681605b35\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_amd64.deb\n Size/MD5 checksum: 34280 3b1eb57caa289d1c776f66d6734dee39\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_amd64.deb\n Size/MD5 checksum: 37726 014109aa721508ef8b6825e5e9744fac\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_amd64.deb\n Size/MD5 checksum: 21416 6b2bf18f6d6db5ee5bf57199639e9870\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_amd64.deb\n Size/MD5 checksum: 18886 01b618565ddfce919b8fffba1b336fad\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_amd64.deb\n Size/MD5 checksum: 8248 8e56bda6cd19f62248eba36057f9c381\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_amd64.deb\n Size/MD5 checksum: 22892 6789a85586205f00dd35f396012d437f\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_amd64.deb\n Size/MD5 checksum: 28786 87c5652813f3fc2e636d0de7c6504585\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_amd64.deb\n Size/MD5 checksum: 7918 c672b5d5a0dcc8ec56ae29b866909ee7\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_amd64.deb\n Size/MD5 checksum: 13684 7996ac194aad7b71aca2ce125f3fe53a\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_amd64.deb\n Size/MD5 checksum: 22444 fba5d84d8727dc342a4613cb4f0e5fca\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_amd64.deb\n Size/MD5 checksum: 17576 182a9c583741056b4f903071066aa777\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_arm.deb\n Size/MD5 checksum: 1592392 e6c3e603f4b01b8b6472a01fa5c8b149\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_arm.deb\n Size/MD5 checksum: 1591960 42fc42a21fafe9980b1cbbd1450b6ebe\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_arm.deb\n Size/MD5 checksum: 3172326 44e7b476a2e1f1d6a8a3515aa407dddb\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_arm.deb\n Size/MD5 checksum: 1593200 0b02299dad2f9a76ee4e11f2d1aba8f1\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_arm.deb\n Size/MD5 checksum: 168244 f3c5d8aa86020ded4056f329cb005fe4\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_arm.deb\n Size/MD5 checksum: 17652 459d0f476feee2720542be633d56a92b\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_arm.deb\n Size/MD5 checksum: 325472 a741698e463184d3b278412189c9c1c2\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_arm.deb\n Size/MD5 checksum: 36114 5de247081d931105d8dfcad25dead156\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_arm.deb\n Size/MD5 checksum: 31782 8581635d5ffcb20066ad8a17742bf27e\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_arm.deb\n Size/MD5 checksum: 35462 da35a74bd0d0db3f7488860e19cfa79d\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_arm.deb\n Size/MD5 checksum: 19736 9be69fb529fcf733a91ac24b024a9958\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_arm.deb\n Size/MD5 checksum: 17086 5e372f2c55c6db64733458342fd27952\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_arm.deb\n Size/MD5 checksum: 7826 6b2e87408132edfc496475409128f949\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_arm.deb\n Size/MD5 checksum: 20600 cfad055dec9f682724478910247d974e\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_arm.deb\n Size/MD5 checksum: 27330 5c1904d04e7f81349b2d78e1cb7abe3b\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_arm.deb\n Size/MD5 checksum: 7644 d6ce09f4c247eb1a69965bc90836df81\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_arm.deb\n Size/MD5 checksum: 12790 31d406e601ca65bfc8a2779d0e7cebb4\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_arm.deb\n Size/MD5 checksum: 20892 822c073cb45186c6d872afdef513bc90\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_arm.deb\n Size/MD5 checksum: 15792 169a0517a14c792e870fcf1b94192276\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_hppa.deb\n Size/MD5 checksum: 1759810 d97fae3b1a080a942653878c82cd3ffa\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_hppa.deb\n Size/MD5 checksum: 1757570 5c77a078ff8b20ea0402b4a904e0232b\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_hppa.deb\n Size/MD5 checksum: 3427812 03e08da005f5f97a6ecd7ab60b5ce68c\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_hppa.deb\n Size/MD5 checksum: 1719506 0d0b5c78f2493fa4911db750d517998a\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_hppa.deb\n Size/MD5 checksum: 168222 7370b1318dc8c75d7008c255b2002f6a\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_hppa.deb\n Size/MD5 checksum: 20028 45464c08d59854305c4a5c9f490d9a63\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_hppa.deb\n Size/MD5 checksum: 325312 ecccda98a727a5eaf06a0f0b17185cce\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_hppa.deb\n Size/MD5 checksum: 42104 40d2342dcc42b48485573952cffc03f7\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_hppa.deb\n Size/MD5 checksum: 37340 88ff9b02b36a7a1c9c2fce8056ef6f15\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_hppa.deb\n Size/MD5 checksum: 42648 8f1169758d56f94f0c92142be87d6be0\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_hppa.deb\n Size/MD5 checksum: 23000 12fa26227ed747fa3af3ad9efeb8d504\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_hppa.deb\n Size/MD5 checksum: 19908 560ad81c6f6db1820c6c572f67cd8152\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_hppa.deb\n Size/MD5 checksum: 8698 0656ad921535945f456fb480cc80743f\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_hppa.deb\n Size/MD5 checksum: 23596 2fae2e9262934c47965416824c08943b\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_hppa.deb\n Size/MD5 checksum: 30172 d2aaabd18fe095a8e106e20505f03ef2\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_hppa.deb\n Size/MD5 checksum: 8340 5f2d0de885c904fec8a775afc40b6334\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_hppa.deb\n Size/MD5 checksum: 14562 e5dd41449a0e1b35188c7b1946610862\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_hppa.deb\n Size/MD5 checksum: 24124 786abb1633ebf48ab459f4e96656efba\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_hppa.deb\n Size/MD5 checksum: 18650 afab0398769e8c50b934ee221ea50a5a\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_i386.deb\n Size/MD5 checksum: 1614182 612dd25787db4bba5c0b54006c02d50b\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_i386.deb\n Size/MD5 checksum: 1612058 9a67d7f1a9aade4bb3eed6b392077bf9\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_i386.deb\n Size/MD5 checksum: 3209228 5ac98a8a5649ea2ae6588c4e460ec90c\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_i386.deb\n Size/MD5 checksum: 1609646 ec3d17f2b3024ef5ed6e8b21c4286b26\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_i386.deb\n Size/MD5 checksum: 168222 9ab456c6fe0ed13f2e591f88a26f81d6\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_i386.deb\n Size/MD5 checksum: 17892 92d2e8793dfca9be7576624beb4b0005\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_i386.deb\n Size/MD5 checksum: 325192 1a382f30b8ece263b027cfcc35ecfe9c\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_i386.deb\n Size/MD5 checksum: 37228 317fd23c3687d861b8b4789c1ea381d1\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_i386.deb\n Size/MD5 checksum: 32384 d0655edb839dae2fa8ce269c84e91500\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_i386.deb\n Size/MD5 checksum: 37402 95a94b237e75a4c1a64bcb592b351498\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_i386.deb\n Size/MD5 checksum: 19958 9cd9bd8707c8b781e9196311f031ec02\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_i386.deb\n Size/MD5 checksum: 17672 4b6d7c1eca69b9b218617ac243fa08ad\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_i386.deb\n Size/MD5 checksum: 8036 d2efa8096dc22d3c83f8095bb1ab4041\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_i386.deb\n Size/MD5 checksum: 21218 042bca1661b147c7be77a69936793904\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_i386.deb\n Size/MD5 checksum: 27138 7bbf0a0bd2aee657573d7174f32f1ae7\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_i386.deb\n Size/MD5 checksum: 7704 449baf33502b9f48c083dc4b338979dd\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_i386.deb\n Size/MD5 checksum: 13152 e1843d982173596abed784d8e7afcafa\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_i386.deb\n Size/MD5 checksum: 21382 629931e8d3024d1905071ec9dca9142b\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_i386.deb\n Size/MD5 checksum: 16400 d58ba81b22439e5285d448c4316bf5f0\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_ia64.deb\n Size/MD5 checksum: 1952256 b11fa1724bd55829b353525d564e47cc\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_ia64.deb\n Size/MD5 checksum: 1949710 aa0d4ee3995c997f265c272bc0445e1d\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_ia64.deb\n Size/MD5 checksum: 3895870 c29d60863e2331e919339626831fb5a4\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_ia64.deb\n Size/MD5 checksum: 1950132 2a7611e476d2afd7f5564e7f4cafac3a\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_ia64.deb\n Size/MD5 checksum: 168224 f3c570f637fb69b0d55dbdaaaf882c53\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_ia64.deb\n Size/MD5 checksum: 22028 f51f4140ef5d8de1db90bfe06d92d8b8\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_ia64.deb\n Size/MD5 checksum: 325338 41a5b1ff824be8410e94d5d3f4eaab5c\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_ia64.deb\n Size/MD5 checksum: 50644 a1f0f2f91dfbf84d24446e455e4d0d7c\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_ia64.deb\n Size/MD5 checksum: 45256 45155a527b60ebcd117901fc86390d67\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_ia64.deb\n Size/MD5 checksum: 48280 cea938e0b3829eeb344939c6116a3274\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_ia64.deb\n Size/MD5 checksum: 27042 fc2b4d3e1ae91076548568d8c922037f\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_ia64.deb\n Size/MD5 checksum: 22658 f0f5301aa72e4e4ad61bdf90e6594de2\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_ia64.deb\n Size/MD5 checksum: 9334 a5c9f81e2bd6bc5ee4c86f5e4d1a0cd1\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_ia64.deb\n Size/MD5 checksum: 27602 89ecb1e38d742cff328580cdfe78b8f1\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_ia64.deb\n Size/MD5 checksum: 36192 49054c542a4534c12894bfefaf0db1eb\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_ia64.deb\n Size/MD5 checksum: 9012 d4db9ef8429729ab3051501004082c99\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_ia64.deb\n Size/MD5 checksum: 16338 d614825738a19af8ad2500b7c048b51b\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_ia64.deb\n Size/MD5 checksum: 28878 6d5df675a23f641f3e1dc5656db9e18a\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_ia64.deb\n Size/MD5 checksum: 21912 e76f15111a9b4ccdd94e1f7eac74b088\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_m68k.deb\n Size/MD5 checksum: 1580014 f45532aa9784f98ff1525bb005c76b30\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_m68k.deb\n Size/MD5 checksum: 1578768 71e652061d4867e6520d448b695f59f7\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_m68k.deb\n Size/MD5 checksum: 3080886 6131fe6ae47c2585775714cc64f2b34e\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_m68k.deb\n Size/MD5 checksum: 1551076 4aef3676854e4ace8e79d0b740109acd\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_m68k.deb\n Size/MD5 checksum: 168268 46923171263033b7d10a73c165baa849\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_m68k.deb\n Size/MD5 checksum: 18322 38c451535b6cd68a0e685c4df93cb01e\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_m68k.deb\n Size/MD5 checksum: 325808 dd492a00a1d27fa02f2b60e6a481d753\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_m68k.deb\n Size/MD5 checksum: 36516 d96b45bb5edaf8edd2282180639ddde8\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_m68k.deb\n Size/MD5 checksum: 31006 5647045aff47fb945f5ad2f148e4aede\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_m68k.deb\n Size/MD5 checksum: 34926 a7fecf002a308ed790931ecc849f379c\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_m68k.deb\n Size/MD5 checksum: 19126 8cd11ec89d611be7674b5117bd48545a\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_m68k.deb\n Size/MD5 checksum: 17820 d4e6de681e37bae511f04d4a3aa5bb2f\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_m68k.deb\n Size/MD5 checksum: 7964 06ac2494cd27c91d06f40592bdde7871\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_m68k.deb\n Size/MD5 checksum: 20694 b290e22f889af582bedf953d3b5e63a2\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_m68k.deb\n Size/MD5 checksum: 25852 be18d00b30fbca8ee6f6d9f31c9912b4\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_m68k.deb\n Size/MD5 checksum: 7682 7fd30edd98afff26bb2d0fedc5556ac8\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_m68k.deb\n Size/MD5 checksum: 12708 f95ada3a476fda3ea9bb36a263dfc19e\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_m68k.deb\n Size/MD5 checksum: 20376 6a0f683bd56800a86976d17cf0f90438\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_m68k.deb\n Size/MD5 checksum: 15878 4d8a9a99d92b68a7c29f9e4eb48e6c28\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mips.deb\n Size/MD5 checksum: 1648626 c09ff318909ac3ec198cf8adb32c3e73\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mips.deb\n Size/MD5 checksum: 1646678 8adf0e0321dad42a4a33278b54c1d78a\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mips.deb\n Size/MD5 checksum: 3295802 61b55383a87aaecf5825679502a2cd94\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mips.deb\n Size/MD5 checksum: 1652658 c094e3ff43dca52eecd39d3d393003f9\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mips.deb\n Size/MD5 checksum: 168214 a85518eecd34caeb8b155741fbba6db2\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mips.deb\n Size/MD5 checksum: 16826 79bb3b43b38eba4b9cfaed68939fb1ad\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mips.deb\n Size/MD5 checksum: 325308 eab0cd699328a69b4f3ef88481985d6c\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mips.deb\n Size/MD5 checksum: 35228 de389e3122cd99882eeeaca2fc7b70a3\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mips.deb\n Size/MD5 checksum: 31938 87dea075793ed76b812a81963c913aef\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mips.deb\n Size/MD5 checksum: 34012 e535078c682091dac1a46f2fb4c0e7c4\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mips.deb\n Size/MD5 checksum: 19922 5fe0bc6ac5386626273ae6ee2e66215b\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mips.deb\n Size/MD5 checksum: 16476 372a59ba3934e84bb106896a06a03a11\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mips.deb\n Size/MD5 checksum: 8120 2b6f78e9419969fdc3ce80bc14d85560\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mips.deb\n Size/MD5 checksum: 20504 0ce56458633d1e77f528d4f9b968ce13\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mips.deb\n Size/MD5 checksum: 26370 3b393309a1ddb3a67a6018496ca29e6b\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mips.deb\n Size/MD5 checksum: 7824 fa7930366a56bb94deaffe6440e94822\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mips.deb\n Size/MD5 checksum: 13154 243bf42c3fdd1db4f402de11750c9171\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mips.deb\n Size/MD5 checksum: 21654 cd359bf978b6ea51e6eb65a37b60278f\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mips.deb\n Size/MD5 checksum: 16188 d4ebc66b677efe3b82a163b62c29aa35\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 1630640 210a7f2df10febfaa52f2447520df140\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 1628878 17b584a9e468eb8ede205a2a6878f4b1\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 3254494 b9a460244d857a77f0d2fc5c1b91894f\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 1631616 370c7e8cb963ec8f95049dbf5675fe4a\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 168228 ff3e221bfb5b79f12c10ebd815d88b29\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 16794 7d960cc9d3e3d362d0f4dba0497eb5b7\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 325308 f14f5986aa26436d2c6d81707b9987d8\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 34774 f4f195f0914c0bc882b5143c479c5d24\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 31666 9f6063fcb54d5379b997ccbc982f65f2\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 33894 da46922024a02d1023b521cc076cb9cb\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 19800 b86f23fe9c0c7ec4b56c2f767693835f\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 16384 3e98c62e74e0523e224ad665e604eb78\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 8092 2ab07f4176f45cbd6a74fbccdb72e9b9\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 20448 61b72f3ff7cbdec0c7bcf644ae7a42e4\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 26244 d38dfaa8d7a2565b38edf485c9692212\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 7778 0aba913f072a2ab411f7f36408838041\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 13054 2b4f2d929c4a9e8d7aafc439b6a6b4b4\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 21598 6691aed3e3879ce3884c31bc0c60ae4f\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mipsel.deb\n Size/MD5 checksum: 16166 696aa9954b611596fa02b92bb15914d3\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 1661280 abad22f7719712b40a4af68503551e21\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 1659466 4997003d5edddb161c931ed7f47cfe0a\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 3281422 f4bdbbaac2e032788c26bb92dc0da376\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 1646784 d84ff6b16873412f6af326995e09ab54\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 168220 3f03b4edeffcd89c5cc4127d3a4602ac\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 19638 1c874990ecb283c1b23950b016485b50\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 325264 15b8a3d2cde40c4aaf31d1925189ab3b\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 38646 3945c96a6cd13120e293f60ae820d6d0\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 34516 b44d4867447c01db49fe5a9c8e538015\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 37770 8fffcc151a281269cccb29559f0b90fc\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 21412 9a9663537ca1997bc62cfa4494eba8f3\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 19728 9bb25b04bec25cee082c8a8e81c4a19d\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 9578 d1bd238a89be2838f5b37d5b2b2a9053\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 22604 2935a012ecd74195f44e2213c9999c7a\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 28686 46bb5b9d2b6e4258fe2b8dc130ae817c\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 9286 2282aefc94808ac2ea1490ecb3ea357f\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 14960 68716f24414748d9e621c7f4b0a8e2ea\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 23038 193ae7cc97bc2ce1c7033cc14cd6c9c9\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_powerpc.deb\n Size/MD5 checksum: 18268 1b032bee509fb88ce36d481c4335418a\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_s390.deb\n Size/MD5 checksum: 1709576 c521d1761395fa41e785906cd052a240\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_s390.deb\n Size/MD5 checksum: 1708618 cbea3ff2f1f8b42c91f8d1ebe6f295a1\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_s390.deb\n Size/MD5 checksum: 3360294 a642ef581d1decdd6b330f2ca62aa3a8\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_s390.deb\n Size/MD5 checksum: 1687438 0a16abfb5e945795b598e06fe78821bd\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_s390.deb\n Size/MD5 checksum: 168202 088f381bf8f67c76e6a636b1a7420709\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_s390.deb\n Size/MD5 checksum: 17842 6f628c4ba64fe7c3e6d1958d8887a032\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_s390.deb\n Size/MD5 checksum: 325188 84155d21cc204dd029cb6fe724fd700e\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_s390.deb\n Size/MD5 checksum: 41124 f159880550b5c238b0f9cd357763e120\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_s390.deb\n Size/MD5 checksum: 33564 560a9717ec712e71a9608ee808017f93\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_s390.deb\n Size/MD5 checksum: 37530 58332a689abe020d696accb2c4413bdc\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_s390.deb\n Size/MD5 checksum: 21410 8266344d677b30c00ee0575185808c7d\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_s390.deb\n Size/MD5 checksum: 17732 1d5a9cdcc554b886836392abacafb37a\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_s390.deb\n Size/MD5 checksum: 8394 bf5bfd48a6955ed04cf5eb43c0dbed80\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_s390.deb\n Size/MD5 checksum: 22938 558f6a81404ef0097f4d47ef41067acd\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_s390.deb\n Size/MD5 checksum: 28874 63b1580d76b438dfe3c6150fca0c983c\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_s390.deb\n Size/MD5 checksum: 8048 fb1993cc4170134b46d0a68496971992\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_s390.deb\n Size/MD5 checksum: 13894 eeee528a1872d8fd80f92c6459950216\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_s390.deb\n Size/MD5 checksum: 22276 ef4cc0b299f757599e7edd178cfbfa95\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_s390.deb\n Size/MD5 checksum: 17300 c2d98a377eff47a1fa6376d491378007\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_sparc.deb\n Size/MD5 checksum: 1623810 c451cd4693f5a69534681b1eba46e29d\n http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_sparc.deb\n Size/MD5 checksum: 1620886 6f450acb1570c2917c92af4e2ee3462b\n http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_sparc.deb\n Size/MD5 checksum: 3197912 c01cbc381a760f7439f8c8b24a8ee717\n http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_sparc.deb\n Size/MD5 checksum: 1606454 0f3be5c22bb512308e0c668b06e7f25b\n http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_sparc.deb\n Size/MD5 checksum: 168222 d4a0310401f3092a2ea57880bed9911d\n http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_sparc.deb\n Size/MD5 checksum: 18074 160821e02197baf3364906d17eabaa37\n http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_sparc.deb\n Size/MD5 checksum: 325276 b0c1759a579859033b410d34bf443162\n http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_sparc.deb\n Size/MD5 checksum: 36488 cb0f7a642bcc12fdcde900b179ad197f\n http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_sparc.deb\n Size/MD5 checksum: 31948 c31211a42a127e283cf05eea2acb3782\n http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_sparc.deb\n Size/MD5 checksum: 36246 ded59dffa2579d4f3f91be5bc465812e\n http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_sparc.deb\n Size/MD5 checksum: 19278 d852fc1b8146be87d789d46f3fd9531a\n http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_sparc.deb\n Size/MD5 checksum: 17488 c25a9f3959ad71717f22139ee5cc3964\n http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_sparc.deb\n Size/MD5 checksum: 7870 54ef2d007c15936eff7a0968c1bb8411\n http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_sparc.deb\n Size/MD5 checksum: 20672 3aa6f646c2d48e12f274844d882b4cb3\n http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_sparc.deb\n Size/MD5 checksum: 26540 db50bace36223a5fb3165012da864279\n http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_sparc.deb\n Size/MD5 checksum: 7594 a16c41b7273adaf2b72e2cd66a29d856\n http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_sparc.deb\n Size/MD5 checksum: 12846 5f44cba16d1c910b0336c221ab3db31b\n http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_sparc.deb\n Size/MD5 checksum: 20850 f84c554b5e0c31a276444953acdf0d5d\n http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_sparc.deb\n Size/MD5 checksum: 15866 56d9a2ad4d2d94150b7be7deefc6fbd0\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFF7zanXm3vHE4uyloRAr0xAKCLwQ7ji6kxWczRj+WZRIEknn3R4QCgxaVz\nShT4FvG6b6xvbngTqwEvkkU=\n=FElM\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "VULHUB", "id": "VHN-17016" }, { "db": "PACKETSTORM", "id": "54956" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-0908", "trust": 1.8 }, { "db": "SREASON", "id": "497", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200602-403", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20060225 [WARAXE-2006-SA#047] - EVADING SQL-INJECTION FILTERS IN PHPNUKE 7.8", "trust": 0.6 }, { "db": "BID", "id": "84067", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-17016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "54956", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-17016" }, { "db": "PACKETSTORM", "id": "54956" }, { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "id": "VAR-200602-0433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-17016" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:13:34.962000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-0908" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.waraxe.us/advisory-47.html" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/497" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/426083/100/0/threaded" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0988" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0909" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-0908" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.3.10-19_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0910" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0907" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.3.10-19_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-19.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-19_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-19_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.3.10-19_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-19_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-19_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.3.10-19_ia64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0906" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-19_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-19_ia64.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-17016" }, { "db": "PACKETSTORM", "id": "54956" }, { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-17016" }, { "db": "PACKETSTORM", "id": "54956" }, { "db": "NVD", "id": "CVE-2006-0908" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-02-28T00:00:00", "db": "VULHUB", "id": "VHN-17016" }, { "date": "2007-03-09T02:34:17", "db": "PACKETSTORM", "id": "54956" }, { "date": "2006-02-28T02:02:00", "db": "NVD", "id": "CVE-2006-0908" }, { "date": "2006-02-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-17016" }, { "date": "2018-10-18T16:29:41.617000", "db": "NVD", "id": "CVE-2006-0908" }, { "date": "2006-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200602-403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "54956" }, { "db": "CNNVD", "id": "CNNVD-200602-403" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke \"ad_click\" of /%2a (/*)SQL Injection vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200602-403" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-200602-403" } ], "trust": 0.6 } }
cve-2006-0908
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
francisco_burzi | php-nuke | 7.8_patched_3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.8_patched_3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E0146C3-38C8-4D16-B4D6-9C16D2BAC635", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter." } ], "id": "CVE-2006-0908", "lastModified": "2024-11-21T00:07:37.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-28T02:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/497" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.waraxe.us/advisory-47.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.waraxe.us/advisory-47.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2006-0908
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2006-0908", "description": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter.", "id": "GSD-2006-0908" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2006-0908" ], "details": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter.", "id": "GSD-2006-0908", "modified": "2023-12-13T01:19:50.160770Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" }, { "name": "497", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/497" }, { "name": "http://www.waraxe.us/advisory-47.html", "refsource": "MISC", "url": "http://www.waraxe.us/advisory-47.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:francisco_burzi:php-nuke:7.8_patched_3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0908" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "PHP-Nuke 7.8 Patched 3.2 allows remote attackers to bypass SQL injection protection mechanisms via /%2a (/*) sequences with the \"ad_click\" word in the query string, as demonstrated via the kala parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.waraxe.us/advisory-47.html", "refsource": "MISC", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.waraxe.us/advisory-47.html" }, { "name": "497", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/497" }, { "name": "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/426083/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-18T16:29Z", "publishedDate": "2006-02-28T02:02Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.