Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
Typeapk
Namespacealpine
Namephp5
Version5.6.31-r0
Qualifiers
arch x86_64
distroversion v3.7
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.6.33-r0
Latest_non_vulnerable_version5.6.37-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-apf9-z7zs-jyh7
vulnerability_id VCID-apf9-z7zs-jyh7
summary oniguruma: Invalid pointer dereference in left_adjust_char_head()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9229.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9229
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59691
published_at 2026-04-29T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59686
published_at 2026-04-24T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59706
published_at 2026-04-26T12:55:00Z
3
value 0.00593
scoring_system epss
scoring_elements 0.69217
published_at 2026-04-02T12:55:00Z
4
value 0.00593
scoring_system epss
scoring_elements 0.69237
published_at 2026-04-04T12:55:00Z
5
value 0.00593
scoring_system epss
scoring_elements 0.69219
published_at 2026-04-07T12:55:00Z
6
value 0.00593
scoring_system epss
scoring_elements 0.69269
published_at 2026-04-08T12:55:00Z
7
value 0.00593
scoring_system epss
scoring_elements 0.69287
published_at 2026-04-09T12:55:00Z
8
value 0.00593
scoring_system epss
scoring_elements 0.69309
published_at 2026-04-11T12:55:00Z
9
value 0.00593
scoring_system epss
scoring_elements 0.69293
published_at 2026-04-21T12:55:00Z
10
value 0.00593
scoring_system epss
scoring_elements 0.69265
published_at 2026-04-13T12:55:00Z
11
value 0.00593
scoring_system epss
scoring_elements 0.69303
published_at 2026-04-16T12:55:00Z
12
value 0.00593
scoring_system epss
scoring_elements 0.69312
published_at 2026-04-18T12:55:00Z
13
value 0.00593
scoring_system epss
scoring_elements 0.69201
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9229
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466746
reference_id 1466746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466746
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863318
reference_id 863318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863318
6
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
7
reference_url https://access.redhat.com/errata/RHSA-2026:7545
reference_id RHSA-2026:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7545
8
reference_url https://usn.ubuntu.com/3382-1/
reference_id USN-3382-1
reference_type
scores
url https://usn.ubuntu.com/3382-1/
9
reference_url https://usn.ubuntu.com/3382-2/
reference_id USN-3382-2
reference_type
scores
url https://usn.ubuntu.com/3382-2/
fixed_packages
0
url pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
aliases CVE-2017-9229
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apf9-z7zs-jyh7
1
url VCID-b5af-c9yc-rke7
vulnerability_id VCID-b5af-c9yc-rke7
summary oniguruma: Out-of-bounds heap write in bitset_set_range()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9228.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9228
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69602
published_at 2026-04-01T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-29T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69753
published_at 2026-04-24T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69761
published_at 2026-04-26T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69615
published_at 2026-04-02T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69631
published_at 2026-04-04T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69609
published_at 2026-04-07T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.6966
published_at 2026-04-08T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69677
published_at 2026-04-09T12:55:00Z
9
value 0.00607
scoring_system epss
scoring_elements 0.69699
published_at 2026-04-11T12:55:00Z
10
value 0.00607
scoring_system epss
scoring_elements 0.69684
published_at 2026-04-12T12:55:00Z
11
value 0.00607
scoring_system epss
scoring_elements 0.6967
published_at 2026-04-13T12:55:00Z
12
value 0.00607
scoring_system epss
scoring_elements 0.69711
published_at 2026-04-16T12:55:00Z
13
value 0.00607
scoring_system epss
scoring_elements 0.6972
published_at 2026-04-18T12:55:00Z
14
value 0.00607
scoring_system epss
scoring_elements 0.69701
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466740
reference_id 1466740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466740
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863316
reference_id 863316
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863316
6
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
7
reference_url https://usn.ubuntu.com/3382-1/
reference_id USN-3382-1
reference_type
scores
url https://usn.ubuntu.com/3382-1/
8
reference_url https://usn.ubuntu.com/3382-2/
reference_id USN-3382-2
reference_type
scores
url https://usn.ubuntu.com/3382-2/
fixed_packages
0
url pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
aliases CVE-2017-9228
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5af-c9yc-rke7
2
url VCID-ge97-dnra-uygw
vulnerability_id VCID-ge97-dnra-uygw
summary oniguruma: Out-of-bounds stack read in mbc_enc_len() during regular expression searching
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9227.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9227
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63941
published_at 2026-04-29T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63931
published_at 2026-04-24T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63943
published_at 2026-04-26T12:55:00Z
3
value 0.00485
scoring_system epss
scoring_elements 0.65313
published_at 2026-04-02T12:55:00Z
4
value 0.00485
scoring_system epss
scoring_elements 0.65338
published_at 2026-04-04T12:55:00Z
5
value 0.00485
scoring_system epss
scoring_elements 0.65302
published_at 2026-04-07T12:55:00Z
6
value 0.00485
scoring_system epss
scoring_elements 0.65354
published_at 2026-04-08T12:55:00Z
7
value 0.00485
scoring_system epss
scoring_elements 0.65366
published_at 2026-04-09T12:55:00Z
8
value 0.00485
scoring_system epss
scoring_elements 0.65385
published_at 2026-04-11T12:55:00Z
9
value 0.00485
scoring_system epss
scoring_elements 0.65372
published_at 2026-04-12T12:55:00Z
10
value 0.00485
scoring_system epss
scoring_elements 0.65344
published_at 2026-04-13T12:55:00Z
11
value 0.00485
scoring_system epss
scoring_elements 0.6538
published_at 2026-04-16T12:55:00Z
12
value 0.00485
scoring_system epss
scoring_elements 0.65391
published_at 2026-04-18T12:55:00Z
13
value 0.00485
scoring_system epss
scoring_elements 0.65375
published_at 2026-04-21T12:55:00Z
14
value 0.00485
scoring_system epss
scoring_elements 0.65263
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466739
reference_id 1466739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466739
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863315
reference_id 863315
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863315
6
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
7
reference_url https://usn.ubuntu.com/3382-1/
reference_id USN-3382-1
reference_type
scores
url https://usn.ubuntu.com/3382-1/
8
reference_url https://usn.ubuntu.com/3382-2/
reference_id USN-3382-2
reference_type
scores
url https://usn.ubuntu.com/3382-2/
fixed_packages
0
url pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
aliases CVE-2017-9227
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge97-dnra-uygw
3
url VCID-gf19-ebyv-u3b5
vulnerability_id VCID-gf19-ebyv-u3b5
summary oniguruma: Out-of-bounds stack read in match_at() during regular expression searching
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9224.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9224
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-29T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70236
published_at 2026-04-24T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70244
published_at 2026-04-26T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71142
published_at 2026-04-02T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71159
published_at 2026-04-04T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71135
published_at 2026-04-07T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71177
published_at 2026-04-08T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.71189
published_at 2026-04-09T12:55:00Z
8
value 0.00664
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-11T12:55:00Z
9
value 0.00664
scoring_system epss
scoring_elements 0.71198
published_at 2026-04-12T12:55:00Z
10
value 0.00664
scoring_system epss
scoring_elements 0.71181
published_at 2026-04-13T12:55:00Z
11
value 0.00664
scoring_system epss
scoring_elements 0.71227
published_at 2026-04-16T12:55:00Z
12
value 0.00664
scoring_system epss
scoring_elements 0.71234
published_at 2026-04-18T12:55:00Z
13
value 0.00664
scoring_system epss
scoring_elements 0.71211
published_at 2026-04-21T12:55:00Z
14
value 0.00664
scoring_system epss
scoring_elements 0.71132
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9224
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466730
reference_id 1466730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466730
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863312
reference_id 863312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863312
6
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
7
reference_url https://usn.ubuntu.com/3382-1/
reference_id USN-3382-1
reference_type
scores
url https://usn.ubuntu.com/3382-1/
8
reference_url https://usn.ubuntu.com/3382-2/
reference_id USN-3382-2
reference_type
scores
url https://usn.ubuntu.com/3382-2/
fixed_packages
0
url pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
aliases CVE-2017-9224
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf19-ebyv-u3b5
4
url VCID-s75c-hjr2-uubw
vulnerability_id VCID-s75c-hjr2-uubw
summary oniguruma: Heap buffer overflow in next_state_val() during regular expression compilation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9226.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9226
reference_id
reference_type
scores
0
value 0.01036
scoring_system epss
scoring_elements 0.77327
published_at 2026-04-01T12:55:00Z
1
value 0.01036
scoring_system epss
scoring_elements 0.7747
published_at 2026-04-29T12:55:00Z
2
value 0.01036
scoring_system epss
scoring_elements 0.77451
published_at 2026-04-24T12:55:00Z
3
value 0.01036
scoring_system epss
scoring_elements 0.77458
published_at 2026-04-26T12:55:00Z
4
value 0.01036
scoring_system epss
scoring_elements 0.77334
published_at 2026-04-02T12:55:00Z
5
value 0.01036
scoring_system epss
scoring_elements 0.77362
published_at 2026-04-04T12:55:00Z
6
value 0.01036
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-07T12:55:00Z
7
value 0.01036
scoring_system epss
scoring_elements 0.77373
published_at 2026-04-08T12:55:00Z
8
value 0.01036
scoring_system epss
scoring_elements 0.77382
published_at 2026-04-09T12:55:00Z
9
value 0.01036
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-11T12:55:00Z
10
value 0.01036
scoring_system epss
scoring_elements 0.77389
published_at 2026-04-12T12:55:00Z
11
value 0.01036
scoring_system epss
scoring_elements 0.77385
published_at 2026-04-13T12:55:00Z
12
value 0.01036
scoring_system epss
scoring_elements 0.77426
published_at 2026-04-16T12:55:00Z
13
value 0.01036
scoring_system epss
scoring_elements 0.77425
published_at 2026-04-18T12:55:00Z
14
value 0.01036
scoring_system epss
scoring_elements 0.77416
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466736
reference_id 1466736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466736
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863314
reference_id 863314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863314
6
reference_url https://access.redhat.com/errata/RHSA-2018:1296
reference_id RHSA-2018:1296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1296
7
reference_url https://usn.ubuntu.com/3382-1/
reference_id USN-3382-1
reference_type
scores
url https://usn.ubuntu.com/3382-1/
8
reference_url https://usn.ubuntu.com/3382-2/
reference_id USN-3382-2
reference_type
scores
url https://usn.ubuntu.com/3382-2/
fixed_packages
0
url pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php5@5.6.31-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
aliases CVE-2017-9226
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s75c-hjr2-uubw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/php5@5.6.31-r0%3Farch=x86_64&distroversion=v3.7&reponame=community