{"id":"CVE-2015-8980","details":"The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.","modified":"2026-04-16T01:39:49.842913258Z","published":"2019-11-04T21:15:11Z","withdrawn":"2026-01-27T04:15:20.269948Z","related":["openSUSE-SU-2024:11171-1"],"references":[{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2016/Aug/76"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2017/01/18/4"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95754"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367462"},{"type":"ADVISORY","url":"https://launchpad.net/php-gettext/trunk/1.0.12"},{"type":"ARTICLE","url":"https://lwn.net/Alerts/708838/"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}