{"id":"CVE-2016-6175","details":"Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.","modified":"2026-04-10T03:52:33.211759Z","published":"2017-02-07T15:59:00.397Z","references":[{"type":"WEB","url":"https://www.exploit-db.com/exploits/40154/"},{"type":"WEB","url":"https://bugs.launchpad.net/php-gettext/+bug/1606184"},{"type":"ADVISORY","url":"https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html"},{"type":"FIX","url":"https://github.com/NagVis/nagvis/commit/4fe8672a5aec3467da72b5852ca6d283c15adb53"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nagvis/nagvis","events":[{"introduced":"0"},{"fixed":"4fe8672a5aec3467da72b5852ca6d283c15adb53"}]},{"type":"GIT","repo":"https://github.com/nagvis/nagvis","events":[{"introduced":"0"},{"fixed":"4fe8672a5aec3467da72b5852ca6d283c15adb53"}]}],"versions":["nagvis-1.0.0","nagvis-1.1.1","nagvis-1.1.2","nagvis-1.2.0","nagvis-1.2.1","nagvis-1.2.2","nagvis-1.3.0","nagvis-1.4.0","nagvis-1.4.1","nagvis-1.5.0","nagvis-1.5.1","nagvis-1.5.2","nagvis-1.5.3","nagvis-1.5.4","nagvis-1.5b1","nagvis-1.5b2","nagvis-1.5b3","nagvis-1.5b4","nagvis-1.5rc2","nagvis-1.5rc3","nagvis-1.6.0","nagvis-1.6.1","nagvis-1.6.2","nagvis-1.6.3","nagvis-1.6.4","nagvis-1.6b1","nagvis-1.6b2","nagvis-1.6b3","nagvis-1.6rc1","nagvis-1.6rc2","nagvis-1.6rc3","nagvis-1.6rc4","nagvis-1.7.0","nagvis-1.7.1","nagvis-1.7.2","nagvis-1.7.3","nagvis-1.7.4","nagvis-1.7.5","nagvis-1.7.6","nagvis-1.7.8","nagvis-1.7.9","nagvis-1.7b1","nagvis-1.7b2","nagvis-1.7b3","nagvis-1.8.0","nagvis-1.8b1","nagvis-1.8b2","nagvis-1.8b3","nagvis-1.8b4","nagvis-1.8b5","nagvis-1.8b6","nagvis-1.8b7","nagvis-1.8rc1","nagvis-1.8rc2","nagvis-1.8rc3","nagvis-1.9a1","nagvis-1.9b1","nagvis-1.9b2","nagvis-1.9b4","nagvis-1.9b5","nagvis-1.9b6","nagvis-1.9b7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6175.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0.12"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}