To the Top
File:  root - text - article - 2016 - 06 - CVE-2015-8874.txt
Tags: 安全, 补丁, Security patch, quickhostuk, | English | Home Page | Category: Computing | 876 Views, 24729 Search Bots | 155 Words

Subscribe to Feed Burner | Browse | Archive
cPanel, Inc. has released updated RPMs for EasyApache 4 on June 29, 2016, with PHP version 5.5.37. This release addresses vulnerabilities related to CVE-2015-8874. We strongly encourage all PHP 5.5 users to upgrade to version 5.5.37.

About the vulnerability:

All versions of PHP 5.5 through version 5.5.36
SECURITY RATING -The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:
CVE-2015-8874 - HIGH
PHP 5.5.37
Fixed bug in the GD module related to CVE-2015-8874

What can I do:

If you are a QuickHostUK Managed Hosting customer this has already been patched. If you are not a QuickHostUK Managed Hosting customer and you are using cPanel/WHM please ensure you have also taken the appropriate actions to secure your own servers.

Alternatively, we can handle this for you with our adhoc management scheme, which for this occurrence would be £25.

Please contact us if you wish to utilise this service or if you have any questions.

Kind Regards,

QuickHostUK Limited
Tags: 安全, 补丁, Security patch, quickhostuk, | English | Home Page | Cateogry: Computing | 876 Views, 24729 Search Bots | 155 Words Subscribe to Feed Burner

Related Articles

  1. [Daily Problem] Remove k-th Last Element From Linked List
  2. Compare Version Numbers
  3. PHP Unit Tests on VPS Server
  4. Algorithm Interview: Maximum Path Sum in Binary Tree
  5. Autorun.inf Virus Protection
  6. Algorithm Interview: Lowest Common Ancestor of 2 Nodes in Binary Tree
  7. Sort a Partially Sorted List
  8. [Daily Problem] Course Prerequisites
  9. Daily Interview Problem: Buddy Strings
  10. Design Tic-Tac-Toe

Comments (0)

    Be the first one to comment this page !


Page Edited: May 11 2024 14:36:49 | RSS Subscription
How to Cook a Perfect Steak? | <meta name="robots" content="index, follow">