Software catalogue for PHP Group - page 17

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › PHP Group

Software catalogue for PHP Group - page 17

PEAR_Info PEAR_LogfileAnalysis PEAR_PackageFileManager PEAR_PackageFileManager_Cli PEAR_PackageFileManager_Frontend PEAR_PackageFileManager_Frontend_Web PEAR_PackageFileManager_Git PEAR_PackageFileManager_GUI_Gtk PEAR_PackageUpdate PEAR_PackageUpdate_Web
PEAR_RemoteInstaller PEAR_Size pear-core pear-core-minimal pear-svn-git pear.github.com pearweb pearweb_phars PHP PHP_Archive


Showing elements 321 - 340 out of 546

  • Previous
  • 17
  • 18
  • More pages
  • 22
  • Next

Latest security bulletins

Secuity bulletin Severity Status Published
SB2025122340: Multiple vulnerabilities in PHP High
Patched
23.12.2025
SB2025070427: Multiple vulnerabilities in PHP Medium
Patched
04.07.2025
SB20250403142: Multiple vulnerabilities in PHP High
Patched Public exploit
03.04.2025
SB2025031234: Multiple vulnerabilities in PHP Medium
Patched
12.03.2025
SB2024111985: Multiple vulnerabilities in PHP High
Patched
19.11.2024
SB2024092724: Multiple vulnerabilities in PHP High
Patched Public exploit
27.09.2024
SB2024081666: Input validation error in PHP Medium
Patched
16.08.2024
SB2024060501: Multiple vulnerabilities in PHP Critical
Patched Exploited
05.06.2024
SB2024042360: Cryptographic issues in PHP Medium
Patched
23.04.2024
SB2024041173: Multiple vulnerabilities in PHP High
Patched Public exploit
11.04.2024

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or