Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://bugs.php.net/bug.php?id=70168", "name": "https://bugs.php.net/bug.php?id=70168", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://bugs.php.net/bug.php?id=70155", "name": "https://bugs.php.net/bug.php?id=70155", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.php.net/ChangeLog-5.php", "name": "http://www.php.net/ChangeLog-5.php", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://bugs.php.net/bug.php?id=70166", "name": "https://bugs.php.net/bug.php?id=70166", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://bugs.php.net/bug.php?id=70169", "name": "https://bugs.php.net/bug.php?id=70169", "tags": ["Exploit", "Issue Tracking", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2015/08/19/3", "name": "[oss-security] 20150819 CVE Request: more php unserializing issues", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MLIST"}, {"url": "http://www.securityfocus.com/bid/76737", "name": "76737", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "https://security.gentoo.org/glsa/201606-10", "name": "GLSA-201606-10", "tags": ["Third Party Advisory"], "refsource": "GENTOO"}, {"url": "http://www.debian.org/security/2015/dsa-3344", "name": "DSA-3344", "tags": ["Third Party Advisory"], "refsource": "DEBIAN"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-416"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2015-6831", "ASSIGNER": "security@suse.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.3, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 3.4, "exploitabilityScore": 3.9}}, "publishedDate": "2016-01-19T05:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.5.28", "versionStartIncluding": "5.5.0"}, {"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.6.12", "versionStartIncluding": "5.6.0"}, {"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "5.4.44"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-08-05T14:28Z"}