{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49824?format=json","vulnerability_id":"VCID-huuh-j4zk-p3bp","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary code.","aliases":[{"alias":"CVE-2017-12932"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77972?format=json","purl":"pkg:ebuild/dev-lang/php@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/77973?format=json","purl":"pkg:ebuild/dev-lang/php@7.0.23","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.0.23"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/110730?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/110731?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/105891?format=json","purl":"pkg:rpm/redhat/rh-php71-php@7.1.30-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ap1-zugk-gbas"},{"vulnerability":"VCID-2frx-71st-5qar"},{"vulnerability":"VCID-2z59-w2uj-skgy"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4gxr-wh6g-bbbe"},{"vulnerability":"VCID-6xda-97rd-9bam"},{"vulnerability":"VCID-8dmb-887r-zqe8"},{"vulnerability":"VCID-8kme-kjne-xubq"},{"vulnerability":"VCID-af13-btr1-7qex"},{"vulnerability":"VCID-aphr-wqxe-h3du"},{"vulnerability":"VCID-b12z-p9yv-c7fb"},{"vulnerability":"VCID-c73c-1vw2-nfdf"},{"vulnerability":"VCID-ce8c-a78t-kkd9"},{"vulnerability":"VCID-dhmd-y13e-t7hm"},{"vulnerability":"VCID-g1b8-dkd3-j3a2"},{"vulnerability":"VCID-g677-513z-fygc"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-jugh-v1yu-cbcv"},{"vulnerability":"VCID-nnxq-za85-73dk"},{"vulnerability":"VCID-nv53-k7pk-yqa7"},{"vulnerability":"VCID-p2fc-mdv6-a3b5"},{"vulnerability":"VCID-pn3v-35ge-fqa6"},{"vulnerability":"VCID-ps5m-es4t-5fbm"},{"vulnerability":"VCID-qwh1-37ux-73h8"},{"vulnerability":"VCID-rjc8-9tfv-sfdk"},{"vulnerability":"VCID-sszm-mvm2-m7ee"},{"vulnerability":"VCID-utwt-7gge-j7c7"},{"vulnerability":"VCID-vh94-jp2p-zygp"},{"vulnerability":"VCID-vtnn-62dq-yuee"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-y1mr-3hx7-mfgc"},{"vulnerability":"VCID-y52x-tykj-4qcx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php71-php@7.1.30-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12932","reference_id":"","reference_type":"","scores":[{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01773","scoring_system":"epss","scoring_elements":"0.82614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84199","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.8415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84149","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0209","scoring_system":"epss","scoring_elements":"0.84167","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84315","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84296","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02303","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02543","scoring_system":"epss","scoring_elements":"0.85494","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484837","reference_id":"1484837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484837"},{"reference_url":"https://security.gentoo.org/glsa/201709-21","reference_id":"GLSA-201709-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2519","reference_id":"RHSA-2019:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2519"}],"weaknesses":[{"cwe_id":416,"name":"Use After Free","description":"Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."}],"exploits":[],"severity_range_score":"5.1 - 8.1","exploitability":"0.5","weighted_severity":"7.3","risk_score":3.6,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-huuh-j4zk-p3bp"}