U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2015-8866

Change History

Modified Analysis by NIST 2/14/2019 1:49:23 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to (including) 5.5.21
     *cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to (including) 5.6.5
OR
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.22
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.6.0 up to (excluding) 5.6.6
Changed Evaluator Description
<a href="http://cwe.mitre.org/data/definitions/611.html">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>
<a href="http://cwe.mitre.org/data/definitions/611.html" rel="nofollow">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>
Changed Reference Type
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 No Types Assigned
http://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 Vendor Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html Mailing List, Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2016-2750.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2016-2750.html Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2016/04/24/1 No Types Assigned
http://www.openwall.com/lists/oss-security/2016/04/24/1 Mailing List, Third Party Advisory
Changed Reference Type
http://www.php.net/ChangeLog-5.php No Types Assigned
http://www.php.net/ChangeLog-5.php Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/bid/87470 No Types Assigned
http://www.securityfocus.com/bid/87470 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-2952-1 No Types Assigned
http://www.ubuntu.com/usn/USN-2952-1 Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-2952-2 No Types Assigned
http://www.ubuntu.com/usn/USN-2952-2 Third Party Advisory
Changed Reference Type
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 No Types Assigned
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817 Third Party Advisory