{"url":"http://public2.vulnerablecode.io/api/packages/114591?format=json","purl":"pkg:rpm/redhat/php@5.4.16-42?arch=el7","type":"rpm","namespace":"redhat","name":"php","version":"5.4.16-42","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82088?format=json","vulnerability_id":"VCID-ay8d-pubf-67fz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5768.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5768","reference_id":"","reference_type":"","scores":[{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95603","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95701","published_at":"2026-05-14T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95684","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95619","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95651","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95653","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95669","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20989","scoring_system":"epss","scoring_elements":"0.95678","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351168","reference_id":"1351168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3045-1/","reference_id":"USN-3045-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3045-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5768"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ay8d-pubf-67fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85048?format=json","vulnerability_id":"VCID-n7w7-16vs-z3gg","summary":"gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5767","reference_id":"","reference_type":"","scores":[{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89278","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89274","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.8927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89344","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89342","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89353","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04623","scoring_system":"epss","scoring_elements":"0.89373","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351069","reference_id":"1351069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"}],"fixed_packages":[],"aliases":["CVE-2016-5767"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w7-16vs-z3gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81968?format=json","vulnerability_id":"VCID-t3bn-hufm-jba8","summary":"security update","references":[{"reference_url":"http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/137998/PHP-7.0.8-5.6.23-5.5.37-bzread-OOB-Write.html"},{"reference_url":"http://php.net/ChangeLog-5.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-5.php"},{"reference_url":"http://php.net/ChangeLog-7.php","reference_id":"","reference_type":"","scores":[],"url":"http://php.net/ChangeLog-7.php"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2598.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2598.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5399.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5399","reference_id":"","reference_type":"","scores":[{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94256","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94371","published_at":"2026-05-14T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94345","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94357","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94276","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94311","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.9432","published_at":"2026-04-24T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13858","scoring_system":"epss","scoring_elements":"0.94333","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5399"},{"reference_url":"https://bugs.php.net/bug.php?id=72613","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=72613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Jul/72","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Jul/72"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180112-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180112-0001/"},{"reference_url":"https://www.exploit-db.com/exploits/40155/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/40155/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3631","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3631"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/07/21/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/07/21/1"},{"reference_url":"http://www.securityfocus.com/archive/1/538966/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/538966/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/92051","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92051"},{"reference_url":"http://www.securitytracker.com/id/1036430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036430"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358395","reference_id":"1358395","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358395"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/40155.py","reference_id":"CVE-2016-5399","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/40155.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5399","reference_id":"CVE-2016-5399","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://usn.ubuntu.com/3045-1/","reference_id":"USN-3045-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3045-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5399"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3bn-hufm-jba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62344?format=json","vulnerability_id":"VCID-tfaf-hb2s-fyb9","summary":"Multiple vulnerabilities have been found in GD, the worst of which\n    allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5766","reference_id":"","reference_type":"","scores":[{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.9481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94851","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94861","published_at":"2026-05-09T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94866","published_at":"2026-05-11T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94872","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16232","scoring_system":"epss","scoring_elements":"0.94883","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351068","reference_id":"1351068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351068"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014","reference_id":"829014","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829014"},{"reference_url":"https://security.gentoo.org/glsa/201612-09","reference_id":"GLSA-201612-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2598","reference_id":"RHSA-2016:2598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2750","reference_id":"RHSA-2016:2750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5443","reference_id":"RHSA-2020:5443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5443"},{"reference_url":"https://usn.ubuntu.com/3030-1/","reference_id":"USN-3030-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3030-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5766"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfaf-hb2s-fyb9"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-42%3Farch=el7"}