CVE-2016-6175

EUVD-2016-7109
Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
php-gettext_projectphp-gettext
𝑥
≤ 1.0.12
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php-gettext
bookworm
1.0.12-5
fixed
bullseye
1.0.12-4
fixed
buster
no-dsa
jessie
no-dsa
sid
1.0.12-6
fixed
stretch
no-dsa
trixie
1.0.12-6
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php-gettext
artful
ignored
bionic
needed
cosmic
ignored
disco
ignored
eoan
ignored
focal
dne
groovy
dne
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
not-affected
noble
not-affected
precise
ignored
trusty
needs-triage
xenial
needed
yakkety
ignored
zesty
ignored