{"id":"RHSA-2016:2750","summary":"Red Hat Security Advisory: rh-php56 security, bug fix, and enhancement update","modified":"2026-01-14T11:02:22.978798Z","published":"2024-09-13T14:38:00Z","upstream":["CVE-2013-7456","CVE-2014-9767","CVE-2015-2325","CVE-2015-2326","CVE-2015-2327","CVE-2015-2328","CVE-2015-3210","CVE-2015-3217","CVE-2015-5073","CVE-2015-8381","CVE-2015-8383","CVE-2015-8384","CVE-2015-8385","CVE-2015-8386","CVE-2015-8388","CVE-2015-8391","CVE-2015-8392","CVE-2015-8395","CVE-2015-8835","CVE-2015-8865","CVE-2015-8866","CVE-2015-8867","CVE-2015-8873","CVE-2015-8874","CVE-2015-8876","CVE-2015-8877","CVE-2015-8879","CVE-2015-8935","CVE-2016-1903","CVE-2016-2554","CVE-2016-3074","CVE-2016-3141","CVE-2016-3142","CVE-2016-4070","CVE-2016-4071","CVE-2016-4072","CVE-2016-4073","CVE-2016-4342","CVE-2016-4343","CVE-2016-4473","CVE-2016-4537","CVE-2016-4538","CVE-2016-4539","CVE-2016-4540","CVE-2016-4541","CVE-2016-4542","CVE-2016-4543","CVE-2016-4544","CVE-2016-5093","CVE-2016-5094","CVE-2016-5096","CVE-2016-5114","CVE-2016-5399","CVE-2016-5766","CVE-2016-5767","CVE-2016-5768","CVE-2016-5770","CVE-2016-5771","CVE-2016-5772","CVE-2016-5773","CVE-2016-6128","CVE-2016-6207","CVE-2016-6288","CVE-2016-6289","CVE-2016-6290","CVE-2016-6291","CVE-2016-6292","CVE-2016-6294","CVE-2016-6295","CVE-2016-6296","CVE-2016-6297","CVE-2016-7124","CVE-2016-7125","CVE-2016-7126","CVE-2016-7127","CVE-2016-7128","CVE-2016-7129","CVE-2016-7130","CVE-2016-7131","CVE-2016-7132"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:2750"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207198"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207202"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260716"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297717"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1305536"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1305543"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315312"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315328"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1321893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323074"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323103"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323106"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323108"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323114"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323118"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332454"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332860"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332865"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332872"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332877"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1336772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1336775"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1338896"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1338907"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1338912"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1339590"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1339949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1340738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351068"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351173"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351603"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358395"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359718"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359800"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359811"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359815"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359822"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1360322"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374697"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374699"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374705"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1374711"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2750.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-7456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-7456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-7456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-9767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-9767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2325"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2326"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2326"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2327"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2328"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-3210"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-3210"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3210"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-3217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-3217"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5073"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8381"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8381"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8381"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8384"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8384"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8384"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8385"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8385"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8391"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8392"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8392"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8395"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8395"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8395"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8835"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8835"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8835"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8865"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8865"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8865"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8866"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8867"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8867"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8867"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8873"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8873"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8873"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8874"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8874"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8874"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8876"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8876"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8876"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8935"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8935"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1903"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2554"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2554"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2554"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3074"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3141"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3142"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3142"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3142"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4070"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4070"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4070"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4071"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4071"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4071"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4072"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4072"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4073"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4342"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4342"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4342"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4343"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4343"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4343"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4473"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4473"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4473"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4539"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4539"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4541"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4542"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4542"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4542"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4543"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4543"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-4544"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-4544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4544"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5093"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5093"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5093"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5094"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5094"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5094"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5114"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5114"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5399"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5399"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5399"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5766"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5766"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5766"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5767"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5768"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5768"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5768"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5770"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5770"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5770"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5771"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5771"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5771"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5773"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5773"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6128"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6207"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6207"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6207"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6288"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6288"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6289"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6289"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6290"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6290"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6291"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6294"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6295"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6295"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6296"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6296"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-6297"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-6297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6297"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7124"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7124"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7124"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7125"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7125"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7125"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7126"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7126"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7126"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7127"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7127"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7127"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7128"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7128"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7128"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7129"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7130"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7130"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7131"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7131"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7132"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7132"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7132"}],"affected":[{"package":{"name":"rh-php56","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-bcmath","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-bcmath"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-cli","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-common","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-dba","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-dba"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-dbg","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-dbg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-devel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-embedded","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-enchant","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-enchant"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-fpm","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-fpm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-gd","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-gd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-gmp","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-gmp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-imap","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-imap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-intl","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-intl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-ldap","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-ldap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-mbstring","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-mbstring"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-mysqlnd","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-mysqlnd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-odbc","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-odbc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-opcache","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-opcache"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pdo","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-pdo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pear","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-pear"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.9.5-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pgsql","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-pgsql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-process","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-process"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pspell","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-pspell"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-recode","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-recode"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-snmp","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-snmp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-soap","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-soap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-tidy","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-tidy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-xml","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-xml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-xmlrpc","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-php-xmlrpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-runtime","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-runtime"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-scldevel","ecosystem":"Red Hat:rhel_software_collections:2::el6","purl":"pkg:rpm/redhat/rh-php56-scldevel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-bcmath","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-bcmath"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-cli","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-common","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-dba","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-dba"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-dbg","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-dbg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-debuginfo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-devel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-embedded","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-embedded"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-enchant","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-enchant"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-fpm","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-fpm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-gd","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-gd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-gmp","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-gmp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-intl","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-intl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-ldap","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-ldap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-mbstring","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-mbstring"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-mysqlnd","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-mysqlnd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-odbc","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-odbc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-opcache","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-opcache"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pdo","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-pdo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pear","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-pear"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.9.5-4.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pgsql","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-pgsql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-process","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-process"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-pspell","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-pspell"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-recode","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-recode"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-snmp","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-snmp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-soap","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-soap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-xml","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-xml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-php-xmlrpc","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-php-xmlrpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.25-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-runtime","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-runtime"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}},{"package":{"name":"rh-php56-scldevel","ecosystem":"Red Hat:rhel_software_collections:2::el7","purl":"pkg:rpm/redhat/rh-php56-scldevel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:2750.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}