Show plain JSON{"id": "CVE-2015-6527", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.3, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 3.4, "exploitabilityScore": 3.9}]}, "published": "2016-01-19T05:59:01.327", "references": [{"url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5", "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2015/07/30/11", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://bugs.php.net/bug.php?id=70140", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2015/07/30/11", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugs.php.net/bug.php?id=70140", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function."}, {"lang": "es", "value": "La funci\u00f3n php_str_replace_in_subjec en ext/standard/string.c en PHP 7.x en versiones anteriores a 7.0.0 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un valor manipulado en el tercer argumento en la funci\u00f3n str_ireplace."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:7.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5C4C35D-F8FE-429F-8F6E-9178EAB21772"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA0E42D0-A586-4735-B3F2-DC51CC1ACDFD"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3358E003-0F13-4FC2-9A00-BE8B3A907912"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A31D38C-B4A3-4412-8C04-0034336A4008"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0EF60E-6DCC-40E2-912F-65639A1E03D2"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A24B9F1-51E6-4070-80CE-6B8BA35E2FA6"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08F899C5-185B-422D-80C8-26C1D1035CD2"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F5FB2E-EE4E-4692-BC61-32A48A6CB395"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBB01909-99C2-45CA-A78A-82310750B638"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4C3FE85-68E8-4B99-8925-8A77CA44C4B4"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6111AC65-5B02-4E3D-BF7E-340809D57515"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "235D8852-3E38-4859-BEDF-4BA8D5D12EB1"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B97290A3-CC6A-493F-876B-A2D1A5F5E690"}, {"criteria": "cpe:2.3:a:php:php:7.0.0:rc8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61C1862E-863E-4CAB-A9D7-9F2383AFA6FB"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}