Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
Removed |
CVSS V3 |
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
|
Added |
CWE |
|
NIST CWE-416
|
Removed |
CWE |
NIST NVD-CWE-Other
|
|
Changed |
CPE Configuration |
OR
*cpe:2.3:a:php:php:5.4.43:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.26:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.5.27:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*
*cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*
|
OR
*cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to (excluding) 5.4.44
*cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.28
*cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.6.0 up to (excluding) 5.6.12
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://www.debian.org/security/2015/dsa-3344 No Types Assigned
|
http://www.debian.org/security/2015/dsa-3344 Third Party Advisory
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2015/08/19/3 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2015/08/19/3 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://www.php.net/ChangeLog-5.php Vendor Advisory
|
http://www.php.net/ChangeLog-5.php Release Notes, Vendor Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/76737 No Types Assigned
|
http://www.securityfocus.com/bid/76737 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://bugs.php.net/bug.php?id=70155 Exploit
|
https://bugs.php.net/bug.php?id=70155 Exploit, Issue Tracking, Vendor Advisory
|
Changed |
Reference Type |
https://bugs.php.net/bug.php?id=70166 Exploit
|
https://bugs.php.net/bug.php?id=70166 Exploit, Issue Tracking, Vendor Advisory
|
Changed |
Reference Type |
https://bugs.php.net/bug.php?id=70168 Exploit
|
https://bugs.php.net/bug.php?id=70168 Exploit, Issue Tracking, Vendor Advisory
|
Changed |
Reference Type |
https://bugs.php.net/bug.php?id=70169 Exploit
|
https://bugs.php.net/bug.php?id=70169 Exploit, Issue Tracking, Vendor Advisory
|
Changed |
Reference Type |
https://security.gentoo.org/glsa/201606-10 No Types Assigned
|
https://security.gentoo.org/glsa/201606-10 Third Party Advisory
|
Removed |
Evaluator Description |
<a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
|
|