/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "5.6.0-alpha4"
}
],
"cpe": "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "5.6.0-alpha5"
}
],
"cpe": "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12"
}
],
"cpe": "cpe:2.3:o:suse:linux_enterprise_module_for_web_scripting:12:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12-sp1"
}
],
"cpe": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "5.6.0-alpha1"
},
{
"last_affected": "5.6.0-alpha2"
},
{
"last_affected": "5.6.0-alpha3"
},
{
"last_affected": "5.6.0-beta1"
},
{
"last_affected": "5.6.0-beta2"
},
{
"last_affected": "5.6.0-beta3"
},
{
"last_affected": "5.6.0-beta4"
},
{
"last_affected": "5.6.1"
},
{
"last_affected": "5.6.2"
},
{
"last_affected": "5.6.3"
},
{
"last_affected": "5.6.4"
},
{
"last_affected": "5.6.5"
},
{
"last_affected": "5.6.6"
},
{
"last_affected": "5.6.7"
},
{
"last_affected": "5.6.8"
},
{
"last_affected": "5.6.9"
},
{
"last_affected": "5.6.10"
},
{
"last_affected": "5.6.11"
},
{
"last_affected": "5.6.12"
},
{
"last_affected": "5.6.13"
},
{
"last_affected": "5.6.14"
},
{
"last_affected": "5.6.15"
},
{
"last_affected": "5.6.16"
},
{
"last_affected": "5.6.17"
},
{
"last_affected": "5.6.18"
},
{
"last_affected": "5.6.19"
},
{
"last_affected": "5.6.20"
},
{
"last_affected": "5.6.21"
},
{
"last_affected": "5.6.22"
},
{
"last_affected": "7.0.7"
}
],
"cpe": [
"cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*"
]
}