{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84697?format=json","vulnerability_id":"VCID-zf7p-9t9z-43bb","summary":"php: Use After Free in unserialize()","aliases":[{"alias":"CVE-2016-9936"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373106?format=json","purl":"pkg:alpm/archlinux/php@7.1.1-0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.1.1-0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373105?format=json","purl":"pkg:alpm/archlinux/php@7.0.13-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.0.13-1"},{"url":"http://public2.vulnerablecode.io/api/packages/110730?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/110731?format=json","purl":"pkg:rpm/redhat/rh-php70-php@7.0.27-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1pj7-5gy9-97f7"},{"vulnerability":"VCID-2da5-db5t-67ez"},{"vulnerability":"VCID-3v99-kbeq-47d8"},{"vulnerability":"VCID-4hnr-jry1-pucd"},{"vulnerability":"VCID-5dtd-t1mm-ekdy"},{"vulnerability":"VCID-6ysv-9bmx-w7df"},{"vulnerability":"VCID-7mzw-4sv9-fkd9"},{"vulnerability":"VCID-8j2y-daty-zudk"},{"vulnerability":"VCID-apf9-z7zs-jyh7"},{"vulnerability":"VCID-aq8f-mndp-b3hf"},{"vulnerability":"VCID-b5af-c9yc-rke7"},{"vulnerability":"VCID-b878-mmfs-e3g1"},{"vulnerability":"VCID-bd4w-by3u-e3d7"},{"vulnerability":"VCID-bgry-c8uh-ebh9"},{"vulnerability":"VCID-bp86-bwju-hfck"},{"vulnerability":"VCID-btsv-fsh6-t7de"},{"vulnerability":"VCID-e743-yn6c-ryd8"},{"vulnerability":"VCID-fkxn-xery-yfav"},{"vulnerability":"VCID-fkyf-n2mp-mkay"},{"vulnerability":"VCID-fwyg-v128-k7c9"},{"vulnerability":"VCID-ge97-dnra-uygw"},{"vulnerability":"VCID-gf19-ebyv-u3b5"},{"vulnerability":"VCID-guq9-1qhz-8uh9"},{"vulnerability":"VCID-huuh-j4zk-p3bp"},{"vulnerability":"VCID-j3tj-mxke-1kga"},{"vulnerability":"VCID-m1pw-ajwh-fkgv"},{"vulnerability":"VCID-mxa9-p8gv-3qhr"},{"vulnerability":"VCID-qv7g-5nw5-y7fc"},{"vulnerability":"VCID-s75c-hjr2-uubw"},{"vulnerability":"VCID-t24w-4tau-13a1"},{"vulnerability":"VCID-uhu4-qp7k-gqgu"},{"vulnerability":"VCID-v2xk-mv3d-pbbp"},{"vulnerability":"VCID-v46x-6fzg-6fcn"},{"vulnerability":"VCID-xh65-k3uv-77af"},{"vulnerability":"VCID-xpjh-4t92-nqgr"},{"vulnerability":"VCID-z5bb-new5-4qda"},{"vulnerability":"VCID-zf7p-9t9z-43bb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9936.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9936","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72235","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72149","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72176","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72098","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72186","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404735","reference_id":"1404735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1404735"},{"reference_url":"https://security.archlinux.org/ASA-201701-28","reference_id":"ASA-201701-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-28"},{"reference_url":"https://security.archlinux.org/AVG-105","reference_id":"AVG-105","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1296","reference_id":"RHSA-2018:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"reference_url":"https://usn.ubuntu.com/3211-1/","reference_id":"USN-3211-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3211-1/"}],"weaknesses":[{"cwe_id":416,"name":"Use After Free","description":"Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."}],"exploits":[],"severity_range_score":"5.1 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zf7p-9t9z-43bb"}