{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84634?format=json","vulnerability_id":"VCID-guq9-1qhz-8uh9","summary":"php: Null pointer dereference when unserializing PHP object","aliases":[{"alias":"CVE-2016-10162"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/110730?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/110731?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10162.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10162","reference_id":"","reference_type":"","scores":[{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88477","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88506","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88519","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419012","reference_id":"1419012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"weaknesses":[{"cwe_id":476,"name":"NULL Pointer Dereference","description":"A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit."}],"exploits":[],"severity_range_score":"5.0 - 5.3","exploitability":"0.5","weighted_severity":"4.8","risk_score":2.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-guq9-1qhz-8uh9"}