{"url":"http://public2.vulnerablecode.io/api/packages/110730?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el6","type":"rpm","namespace":"redhat","name":"rh-php70-php","version":"7.0.27-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81340?format=json","vulnerability_id":"VCID-1pj7-5gy9-97f7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10167","reference_id":"","reference_type":"","scores":[{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.7672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76768","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76798","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76805","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.7682","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76869","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418984","reference_id":"1418984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418984"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3221","reference_id":"RHSA-2017:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10167"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pj7-5gy9-97f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59888?format=json","vulnerability_id":"VCID-2da5-db5t-67ez","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7418.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7418","reference_id":"","reference_type":"","scores":[{"value":"0.02","scoring_system":"epss","scoring_elements":"0.8359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.8369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83728","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83751","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83788","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83804","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02","scoring_system":"epss","scoring_elements":"0.83838","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377352","reference_id":"1377352","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7418"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2da5-db5t-67ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61526?format=json","vulnerability_id":"VCID-3v99-kbeq-47d8","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    could result in the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5711","reference_id":"","reference_type":"","scores":[{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.9199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07835","scoring_system":"epss","scoring_elements":"0.91988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93199","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93231","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93247","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10274","scoring_system":"epss","scoring_elements":"0.93224","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535246","reference_id":"1535246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485","reference_id":"887485","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887485"},{"reference_url":"https://security.archlinux.org/AVG-865","reference_id":"AVG-865","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-865"},{"reference_url":"https://security.gentoo.org/glsa/201903-18","reference_id":"GLSA-201903-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://usn.ubuntu.com/3755-1/","reference_id":"USN-3755-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3755-1/"}],"fixed_packages":[],"aliases":["CVE-2018-5711"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v99-kbeq-47d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63796?format=json","vulnerability_id":"VCID-4hnr-jry1-pucd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12934.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12934","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61294","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61191","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6114","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61189","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61248","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61237","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.6548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.656","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65606","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484839","reference_id":"1484839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"}],"fixed_packages":[],"aliases":["CVE-2017-12934"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4hnr-jry1-pucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81334?format=json","vulnerability_id":"VCID-5dtd-t1mm-ekdy","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7479.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7479","reference_id":"","reference_type":"","scores":[{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95544","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95516","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95517","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20172","scoring_system":"epss","scoring_elements":"0.95538","published_at":"2026-05-09T12:55:00Z"},{"value":"0.21629","scoring_system":"epss","scoring_elements":"0.9579","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412686","reference_id":"1412686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7479"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5dtd-t1mm-ekdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72904?format=json","vulnerability_id":"VCID-6ysv-9bmx-w7df","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7890","reference_id":"","reference_type":"","scores":[{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.962","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.25333","scoring_system":"epss","scoring_elements":"0.96196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28056","scoring_system":"epss","scoring_elements":"0.96487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.9672","published_at":"2026-05-12T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96728","published_at":"2026-05-14T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96707","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96712","published_at":"2026-05-09T12:55:00Z"},{"value":"0.30217","scoring_system":"epss","scoring_elements":"0.96716","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473822","reference_id":"1473822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473822"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263","reference_id":"869263","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0406","reference_id":"RHSA-2018:0406","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3389-1/","reference_id":"USN-3389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3389-1/"},{"reference_url":"https://usn.ubuntu.com/3389-2/","reference_id":"USN-3389-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3389-2/"}],"fixed_packages":[],"aliases":["CVE-2017-7890"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysv-9bmx-w7df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49823?format=json","vulnerability_id":"VCID-7mzw-4sv9-fkd9","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11628.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11628","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35701","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45773","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45845","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45804","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45785","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"},{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475522","reference_id":"1475522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475522"},{"reference_url":"https://security.gentoo.org/glsa/201709-21","reference_id":"GLSA-201709-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11628"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7mzw-4sv9-fkd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49944?format=json","vulnerability_id":"VCID-8j2y-daty-zudk","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10159.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10159","reference_id":"","reference_type":"","scores":[{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.9213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92146","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.9216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92169","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92182","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.9219","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92194","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08084","scoring_system":"epss","scoring_elements":"0.92221","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419020","reference_id":"1419020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419020"},{"reference_url":"https://security.gentoo.org/glsa/201702-29","reference_id":"GLSA-201702-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10159"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8j2y-daty-zudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84290?format=json","vulnerability_id":"VCID-apf9-z7zs-jyh7","summary":"oniguruma: Invalid pointer dereference in left_adjust_char_head()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9229.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9229","reference_id":"","reference_type":"","scores":[{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59814","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59691","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59654","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59702","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5976","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59717","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69201","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00593","scoring_system":"epss","scoring_elements":"0.69269","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466746","reference_id":"1466746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466746"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863318","reference_id":"863318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7545","reference_id":"RHSA-2026:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7545"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9229"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apf9-z7zs-jyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82260?format=json","vulnerability_id":"VCID-aq8f-mndp-b3hf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9934.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9934","reference_id":"","reference_type":"","scores":[{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93603","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93717","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93699","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93623","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.9364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93669","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.9367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93678","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93689","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11579","scoring_system":"epss","scoring_elements":"0.93698","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404726","reference_id":"1404726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404726"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"}],"fixed_packages":[],"aliases":["CVE-2016-9934"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq8f-mndp-b3hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84289?format=json","vulnerability_id":"VCID-b5af-c9yc-rke7","summary":"oniguruma: Out-of-bounds heap write in bitset_set_range()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9228.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9228","reference_id":"","reference_type":"","scores":[{"value":"0.00585","scoring_system":"epss","scoring_elements":"0.69236","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00585","scoring_system":"epss","scoring_elements":"0.69162","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00585","scoring_system":"epss","scoring_elements":"0.69186","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69684","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.6972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00607","scoring_system":"epss","scoring_elements":"0.69602","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"},{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466740","reference_id":"1466740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466740"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863316","reference_id":"863316","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9228"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b5af-c9yc-rke7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81341?format=json","vulnerability_id":"VCID-b878-mmfs-e3g1","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10168","reference_id":"","reference_type":"","scores":[{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.7091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70944","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71031","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71051","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71088","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71054","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71081","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418986","reference_id":"1418986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3221","reference_id":"RHSA-2017:3221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10168"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b878-mmfs-e3g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49946?format=json","vulnerability_id":"VCID-bd4w-by3u-e3d7","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10161.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10161","reference_id":"","reference_type":"","scores":[{"value":"0.14173","scoring_system":"epss","scoring_elements":"0.9445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.14173","scoring_system":"epss","scoring_elements":"0.94424","published_at":"2026-05-09T12:55:00Z"},{"value":"0.14173","scoring_system":"epss","scoring_elements":"0.94431","published_at":"2026-05-11T12:55:00Z"},{"value":"0.14173","scoring_system":"epss","scoring_elements":"0.94438","published_at":"2026-05-12T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94469","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94505","published_at":"2026-05-05T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14631","scoring_system":"epss","scoring_elements":"0.94449","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419010","reference_id":"1419010","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419010"},{"reference_url":"https://security.gentoo.org/glsa/201702-29","reference_id":"GLSA-201702-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10161"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bd4w-by3u-e3d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59887?format=json","vulnerability_id":"VCID-bgry-c8uh-ebh9","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7417","reference_id":"","reference_type":"","scores":[{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84201","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.8427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84292","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84322","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84354","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84396","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84395","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84411","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02157","scoring_system":"epss","scoring_elements":"0.84443","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377344","reference_id":"1377344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7417"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgry-c8uh-ebh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49945?format=json","vulnerability_id":"VCID-bp86-bwju-hfck","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10160.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10160","reference_id":"","reference_type":"","scores":[{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89334","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89355","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89371","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89386","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89421","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89434","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89433","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89443","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04701","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419018","reference_id":"1419018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419018"},{"reference_url":"https://security.gentoo.org/glsa/201702-29","reference_id":"GLSA-201702-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10160"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bp86-bwju-hfck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49943?format=json","vulnerability_id":"VCID-btsv-fsh6-t7de","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10158.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10158","reference_id":"","reference_type":"","scores":[{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89724","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89726","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89725","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89737","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89752","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89763","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89759","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89768","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04988","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419015","reference_id":"1419015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419015"},{"reference_url":"https://security.gentoo.org/glsa/201702-29","reference_id":"GLSA-201702-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10158"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btsv-fsh6-t7de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59886?format=json","vulnerability_id":"VCID-e743-yn6c-ryd8","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7416.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7416","reference_id":"","reference_type":"","scores":[{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85358","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.8539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.8546","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.8548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85488","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85505","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85529","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02527","scoring_system":"epss","scoring_elements":"0.85594","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377340","reference_id":"1377340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7416"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e743-yn6c-ryd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49947?format=json","vulnerability_id":"VCID-fkxn-xery-yfav","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9935.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9935","reference_id":"","reference_type":"","scores":[{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88943","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89088","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89062","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89071","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89005","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.88999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89011","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89031","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89041","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04393","scoring_system":"epss","scoring_elements":"0.89067","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404731","reference_id":"1404731","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404731"},{"reference_url":"https://security.archlinux.org/ASA-201701-28","reference_id":"ASA-201701-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-28"},{"reference_url":"https://security.archlinux.org/AVG-105","reference_id":"AVG-105","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-105"},{"reference_url":"https://security.gentoo.org/glsa/201702-29","reference_id":"GLSA-201702-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3196-1/","reference_id":"USN-3196-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3196-1/"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-9935"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkxn-xery-yfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63795?format=json","vulnerability_id":"VCID-fkyf-n2mp-mkay","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12933.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12933","reference_id":"","reference_type":"","scores":[{"value":"0.1303","scoring_system":"epss","scoring_elements":"0.94163","published_at":"2026-05-14T12:55:00Z"},{"value":"0.1303","scoring_system":"epss","scoring_elements":"0.94141","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1303","scoring_system":"epss","scoring_elements":"0.94146","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1303","scoring_system":"epss","scoring_elements":"0.9415","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16709","scoring_system":"epss","scoring_elements":"0.94915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16709","scoring_system":"epss","scoring_elements":"0.94916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16709","scoring_system":"epss","scoring_elements":"0.94904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16709","scoring_system":"epss","scoring_elements":"0.94912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16846","scoring_system":"epss","scoring_elements":"0.94971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16846","scoring_system":"epss","scoring_elements":"0.94972","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16846","scoring_system":"epss","scoring_elements":"0.94981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16846","scoring_system":"epss","scoring_elements":"0.94987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16846","scoring_system":"epss","scoring_elements":"0.94968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.95563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.95569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.9557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.95578","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.9556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2054","scoring_system":"epss","scoring_elements":"0.95567","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:P"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484838","reference_id":"1484838","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3566-1/","reference_id":"USN-3566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3566-1/"},{"reference_url":"https://usn.ubuntu.com/3566-2/","reference_id":"USN-3566-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3566-2/"}],"fixed_packages":[],"aliases":["CVE-2017-12933"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyf-n2mp-mkay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82259?format=json","vulnerability_id":"VCID-fwyg-v128-k7c9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9933","reference_id":"","reference_type":"","scores":[{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.9354","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93522","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93528","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.9344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.9349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93493","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93497","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11102","scoring_system":"epss","scoring_elements":"0.93511","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404723","reference_id":"1404723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404723"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038","reference_id":"849038","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849038"},{"reference_url":"https://security.archlinux.org/ASA-201611-19","reference_id":"ASA-201611-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-19"},{"reference_url":"https://security.archlinux.org/AVG-58","reference_id":"AVG-58","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-58"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3213-1/","reference_id":"USN-3213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3213-1/"}],"fixed_packages":[],"aliases":["CVE-2016-9933"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyg-v128-k7c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84288?format=json","vulnerability_id":"VCID-ge97-dnra-uygw","summary":"oniguruma: Out-of-bounds stack read in mbc_enc_len() during regular expression searching","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9227.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9227","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6405","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63931","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.64006","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63972","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.6538","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65263","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65338","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65302","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65354","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466739","reference_id":"1466739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466739"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863315","reference_id":"863315","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9227"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge97-dnra-uygw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84292?format=json","vulnerability_id":"VCID-gf19-ebyv-u3b5","summary":"oniguruma: Out-of-bounds stack read in match_at() during regular expression searching","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9224.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9224","reference_id":"","reference_type":"","scores":[{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70217","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7026","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70292","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70288","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71198","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71234","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71177","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466730","reference_id":"1466730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466730"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863312","reference_id":"863312","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9224"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf19-ebyv-u3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84634?format=json","vulnerability_id":"VCID-guq9-1qhz-8uh9","summary":"php: Null pointer dereference when unserializing PHP object","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10162.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10162","reference_id":"","reference_type":"","scores":[{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88477","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88506","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88519","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419012","reference_id":"1419012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-10162"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-guq9-1qhz-8uh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49824?format=json","vulnerability_id":"VCID-huuh-j4zk-p3bp","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12932","reference_id":"","reference_type":"","scores":[{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84199","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.8415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84149","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84167","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84315","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84296","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02543","scoring_system":"epss","scoring_elements":"0.85494","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484837","reference_id":"1484837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484837"},{"reference_url":"https://security.gentoo.org/glsa/201709-21","reference_id":"GLSA-201709-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"}],"fixed_packages":[],"aliases":["CVE-2017-12932"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-huuh-j4zk-p3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63797?format=json","vulnerability_id":"VCID-j3tj-mxke-1kga","summary":"security update","references":[{"reference_url":"http://php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-5.php"},{"reference_url":"http://php.net/ChangeLog-7.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-7.php"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16642.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16642.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16642","reference_id":"","reference_type":"","scores":[{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92303","published_at":"2026-05-14T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92275","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.9221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92256","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08257","scoring_system":"epss","scoring_elements":"0.92266","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536"},{"reference_url":"https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1"},{"reference_url":"https://security.netapp.com/advisory/ntap-20181123-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20181123-0001/"},{"reference_url":"https://www.debian.org/security/2018/dsa-4080","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4080"},{"reference_url":"https://www.debian.org/security/2018/dsa-4081","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4081"},{"reference_url":"https://www.exploit-db.com/exploits/43133/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/43133/"},{"reference_url":"http://www.securityfocus.com/bid/101745","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1512057","reference_id":"1512057","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1512057"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.php.net/bug.php?id=75055","reference_id":"CVE-2017-16642","reference_type":"exploit","scores":[],"url":"https://bugs.php.net/bug.php?id=75055"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43133.php","reference_id":"CVE-2017-16642","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43133.php"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16642","reference_id":"CVE-2017-16642","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16642"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://usn.ubuntu.com/3566-1/","reference_id":"USN-3566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3566-1/"}],"fixed_packages":[],"aliases":["CVE-2017-16642"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j3tj-mxke-1kga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63793?format=json","vulnerability_id":"VCID-m1pw-ajwh-fkgv","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11144.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11144","reference_id":"","reference_type":"","scores":[{"value":"0.31032","scoring_system":"epss","scoring_elements":"0.96724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31032","scoring_system":"epss","scoring_elements":"0.96713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31032","scoring_system":"epss","scoring_elements":"0.96729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31032","scoring_system":"epss","scoring_elements":"0.96723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97413","published_at":"2026-05-14T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97378","published_at":"2026-04-26T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97385","published_at":"2026-05-05T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97395","published_at":"2026-05-09T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97399","published_at":"2026-05-11T12:55:00Z"},{"value":"0.40698","scoring_system":"epss","scoring_elements":"0.97405","published_at":"2026-05-12T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.9741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97413","published_at":"2026-04-11T12:55:00Z"},{"value":"0.41629","scoring_system":"epss","scoring_elements":"0.97414","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:P"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471827","reference_id":"1471827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11144"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1pw-ajwh-fkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59883?format=json","vulnerability_id":"VCID-mxa9-p8gv-3qhr","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7412.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7412","reference_id":"","reference_type":"","scores":[{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.8239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82444","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.8244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.8247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82498","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82508","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82512","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82553","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82573","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82588","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377311","reference_id":"1377311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7412"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mxa9-p8gv-3qhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59884?format=json","vulnerability_id":"VCID-qv7g-5nw5-y7fc","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7413.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7413","reference_id":"","reference_type":"","scores":[{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81748","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81765","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81811","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81808","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81824","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01595","scoring_system":"epss","scoring_elements":"0.81865","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377314","reference_id":"1377314","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7413"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7g-5nw5-y7fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84352?format=json","vulnerability_id":"VCID-s75c-hjr2-uubw","summary":"oniguruma: Heap buffer overflow in next_state_val() during regular expression compilation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9226.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9226","reference_id":"","reference_type":"","scores":[{"value":"0.00999","scoring_system":"epss","scoring_elements":"0.77105","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00999","scoring_system":"epss","scoring_elements":"0.77088","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77389","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.7747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77477","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77504","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77527","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77426","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01036","scoring_system":"epss","scoring_elements":"0.77334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01079","scoring_system":"epss","scoring_elements":"0.78026","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466736","reference_id":"1466736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1466736"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863314","reference_id":"863314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-9226"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s75c-hjr2-uubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49822?format=json","vulnerability_id":"VCID-t24w-4tau-13a1","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11362.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11362","reference_id":"","reference_type":"","scores":[{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.83999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84027","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.8406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84084","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84107","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84123","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84139","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02083","scoring_system":"epss","scoring_elements":"0.84172","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11362"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475373","reference_id":"1475373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475373"},{"reference_url":"https://security.gentoo.org/glsa/201709-21","reference_id":"GLSA-201709-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3566-2/","reference_id":"USN-3566-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3566-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11362"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t24w-4tau-13a1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83052?format=json","vulnerability_id":"VCID-uhu4-qp7k-gqgu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11143.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11143","reference_id":"","reference_type":"","scores":[{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.93055","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.92992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.92988","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.92994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.93011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.93023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.93026","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09817","scoring_system":"epss","scoring_elements":"0.93033","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93757","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93724","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11856","scoring_system":"epss","scoring_elements":"0.93714","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471824","reference_id":"1471824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11143"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhu4-qp7k-gqgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84668?format=json","vulnerability_id":"VCID-v2xk-mv3d-pbbp","summary":"php: Use of uninitialized memory in unserialize()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5340.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5340","reference_id":"","reference_type":"","scores":[{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91625","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91609","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91554","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91602","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5340"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412631","reference_id":"1412631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412631"},{"reference_url":"https://security.archlinux.org/ASA-201701-28","reference_id":"ASA-201701-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-28"},{"reference_url":"https://security.archlinux.org/AVG-105","reference_id":"AVG-105","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2017-5340"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v2xk-mv3d-pbbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59885?format=json","vulnerability_id":"VCID-v46x-6fzg-6fcn","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could lead to arbitrary code execution or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7414.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7414","reference_id":"","reference_type":"","scores":[{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82569","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8259","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82645","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01738","scoring_system":"epss","scoring_elements":"0.82687","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377336","reference_id":"1377336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3095-1/","reference_id":"USN-3095-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3095-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7414"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v46x-6fzg-6fcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63798?format=json","vulnerability_id":"VCID-xh65-k3uv-77af","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5712.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5712","reference_id":"","reference_type":"","scores":[{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.9953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99535","published_at":"2026-04-12T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99538","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.9954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99542","published_at":"2026-04-29T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99543","published_at":"2026-05-09T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99545","published_at":"2026-05-11T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.89192","scoring_system":"epss","scoring_elements":"0.99547","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535251","reference_id":"1535251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1112","reference_id":"RHSA-2020:1112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1112"},{"reference_url":"https://usn.ubuntu.com/3566-1/","reference_id":"USN-3566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3566-1/"},{"reference_url":"https://usn.ubuntu.com/3600-1/","reference_id":"USN-3600-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3600-1/"},{"reference_url":"https://usn.ubuntu.com/3600-2/","reference_id":"USN-3600-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3600-2/"}],"fixed_packages":[],"aliases":["CVE-2018-5712"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xh65-k3uv-77af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84684?format=json","vulnerability_id":"VCID-xpjh-4t92-nqgr","summary":"php: Out-of-bounds read in phar_parse_pharfile","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11147.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11147","reference_id":"","reference_type":"","scores":[{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.88028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.88058","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.88017","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.88015","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.87968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.87974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.87975","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.87986","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03691","scoring_system":"epss","scoring_elements":"0.88001","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471842","reference_id":"1471842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11147"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpjh-4t92-nqgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63794?format=json","vulnerability_id":"VCID-z5bb-new5-4qda","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11145.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11145","reference_id":"","reference_type":"","scores":[{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91973","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.9192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91943","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07713","scoring_system":"epss","scoring_elements":"0.91949","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08268","scoring_system":"epss","scoring_elements":"0.9221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08268","scoring_system":"epss","scoring_elements":"0.92216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08268","scoring_system":"epss","scoring_elements":"0.92219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08268","scoring_system":"epss","scoring_elements":"0.92203","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471834","reference_id":"1471834","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1471834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3382-1/","reference_id":"USN-3382-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-1/"},{"reference_url":"https://usn.ubuntu.com/3382-2/","reference_id":"USN-3382-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3382-2/"}],"fixed_packages":[],"aliases":["CVE-2017-11145"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z5bb-new5-4qda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84697?format=json","vulnerability_id":"VCID-zf7p-9t9z-43bb","summary":"php: Use After Free in unserialize()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9936.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9936","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72235","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72149","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72176","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72098","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72186","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404735","reference_id":"1404735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404735"},{"reference_url":"https://security.archlinux.org/ASA-201701-28","reference_id":"ASA-201701-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-28"},{"reference_url":"https://security.archlinux.org/AVG-105","reference_id":"AVG-105","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"fixed_packages":[],"aliases":["CVE-2016-9936"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zf7p-9t9z-43bb"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el6"}