{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84668?format=json","vulnerability_id":"VCID-v2xk-mv3d-pbbp","summary":"php: Use of uninitialized memory in unserialize()","aliases":[{"alias":"CVE-2017-5340"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373106?format=json","purl":"pkg:alpm/archlinux/php@7.1.1-0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.1.1-0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373105?format=json","purl":"pkg:alpm/archlinux/php@7.0.13-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.0.13-1"},{"url":"http://public2.vulnerablecode.io/api/packages/110730?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/110731?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5340.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5340","reference_id":"","reference_type":"","scores":[{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91625","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91609","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91554","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0714","scoring_system":"epss","scoring_elements":"0.91602","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5340"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412631","reference_id":"1412631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1412631"},{"reference_url":"https://security.archlinux.org/ASA-201701-28","reference_id":"ASA-201701-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-28"},{"reference_url":"https://security.archlinux.org/AVG-105","reference_id":"AVG-105","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"weaknesses":[{"cwe_id":456,"name":"Missing Initialization of a Variable","description":"The product does not initialize critical variables, which causes the execution environment to use unexpected values."}],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v2xk-mv3d-pbbp"}