9.8
CVSSv3

CVE-2016-4473

Published: 08/06/2017 Updated: 16/06/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote malicious users to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 7.0.7

php php 5.6.0

php php 5.6.8

php php 5.6.9

php php 5.6.10

php php 5.6.11

php php 5.6.5

php php 5.6.7

php php 5.6.12

php php 5.6.14

php php 5.6.21

php php 5.6.4

php php 5.6.6

php php 5.6.13

php php 5.6.15

php php 5.6.20

php php 5.6.22

php php 5.6.1

php php 5.6.2

php php 5.6.3

php php 5.6.16

php php 5.6.17

php php 5.6.18

php php 5.6.19

suse linux enterprise software development kit 12

suse linux enterprise module for web scripting 12

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
/ext/phar/phar_objectc in PHP 707 and 56x allows remote attackers to execute arbitrary code NOTE: Introduced as part of an incomplete fix to CVE-2015-6833 ...