Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7", "name": "https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://bugs.php.net/bug.php?id=74145", "name": "https://bugs.php.net/bug.php?id=74145", "tags": ["Issue Tracking", "Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://php.net/ChangeLog-5.php", "name": "http://php.net/ChangeLog-5.php", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://openwall.com/lists/oss-security/2017/07/10/6", "name": "http://openwall.com/lists/oss-security/2017/07/10/6", "tags": ["Mailing List", "Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/99553", "name": "99553", "tags": [], "refsource": "BID"}, {"url": "https://www.tenable.com/security/tns-2017-12", "name": "https://www.tenable.com/security/tns-2017-12", "tags": [], "refsource": "CONFIRM"}, {"url": "https://www.debian.org/security/2018/dsa-4081", "name": "DSA-4081", "tags": [], "refsource": "DEBIAN"}, {"url": "https://security.netapp.com/advisory/ntap-20180112-0001/", "name": "https://security.netapp.com/advisory/ntap-20180112-0001/", "tags": [], "refsource": "CONFIRM"}, {"url": "https://access.redhat.com/errata/RHSA-2018:1296", "name": "RHSA-2018:1296", "tags": [], "refsource": "REDHAT"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-416"}, {"lang": "en", "value": "CWE-502"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2017-11143", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2017-07-10T14:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "5.6.30"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-05-04T01:29Z"}