Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1050655?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1050655?format=api", "purl": "pkg:deb/debian/php7.4@7.4.33-1%2Bdeb11u5", "type": "deb", "namespace": "debian", "name": "php7.4", "version": "7.4.33-1+deb11u5", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72687?format=api", "vulnerability_id": "VCID-1re1-15w4-cqeq", "summary": "php: Leak partial content of the heap through heap buffer over-read in mysqlnd", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8929", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71263", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71253", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.7126", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71163", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00681", "scoring_system": "epss", "scoring_elements": "0.71566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00681", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688", "reference_id": "1088688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327960", "reference_id": "2327960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327960" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678", "reference_id": "GHSA-h35g-vwh6-m678", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-22T17:37:12Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7157-1/", "reference_id": "USN-7157-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-1/" }, { "reference_url": "https://usn.ubuntu.com/7157-3/", "reference_id": "USN-7157-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-8929" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1re1-15w4-cqeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65493?format=api", "vulnerability_id": "VCID-26ab-3bt8-jkf3", "summary": "php: heap-based buffer overflow in array_merge()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05947", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05905", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06057", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06081", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0611", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05966", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05895", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07119", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574", "reference_id": "1123574", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425625", "reference_id": "2425625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425625" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2", "reference_id": "GHSA-h96m-rvf9-jgm2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-29T16:00:50Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1169", "reference_id": "RHSA-2026:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1185", "reference_id": "RHSA-2026:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1187", "reference_id": "RHSA-2026:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1190", "reference_id": "RHSA-2026:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1409", "reference_id": "RHSA-2026:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1412", "reference_id": "RHSA-2026:1412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1429", "reference_id": "RHSA-2026:1429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1628", "reference_id": "RHSA-2026:1628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2799", "reference_id": "RHSA-2026:2799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4077", "reference_id": "RHSA-2026:4077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4086", "reference_id": "RHSA-2026:4086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4212", "reference_id": "RHSA-2026:4212", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4212" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4266", "reference_id": "RHSA-2026:4266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4507", "reference_id": "RHSA-2026:4507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4514", "reference_id": "RHSA-2026:4514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4517", "reference_id": "RHSA-2026:4517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4517" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7614", "reference_id": "RHSA-2026:7614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7614" }, { "reference_url": "https://usn.ubuntu.com/7953-1/", "reference_id": "USN-7953-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7953-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-14178" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26ab-3bt8-jkf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72685?format=api", "vulnerability_id": "VCID-341r-8amt-z7dr", "summary": "php: Configuring a proxy in a stream context might allow for CRLF injection in URIs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11234", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78595", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78539", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78521", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78541", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78538", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78571", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78578", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01559", "scoring_system": "epss", "scoring_elements": "0.81434", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02098", "scoring_system": "epss", "scoring_elements": "0.84011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02098", "scoring_system": "epss", "scoring_elements": "0.83996", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688", "reference_id": "1088688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328523", "reference_id": "2328523", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328523" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2", "reference_id": "GHSA-c5f2-jwm7-mmq2", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:39Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7157-1/", "reference_id": "USN-7157-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-1/" }, { "reference_url": "https://usn.ubuntu.com/7157-3/", "reference_id": "USN-7157-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-11234" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-341r-8amt-z7dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35779?format=api", "vulnerability_id": "VCID-53h9-y2ns-jfh1", "summary": "Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8927", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63672", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63677", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63596", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63664", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63653", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317051", "reference_id": "2317051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317051" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp", "reference_id": "GHSA-94p6-54jq-9mwp", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:50:40Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp" }, { "reference_url": "https://security.gentoo.org/glsa/202501-11", "reference_id": "GLSA-202501-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10949", "reference_id": "RHSA-2024:10949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10950", "reference_id": "RHSA-2024:10950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10951", "reference_id": "RHSA-2024:10951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10952", "reference_id": "RHSA-2024:10952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://usn.ubuntu.com/7049-1/", "reference_id": "USN-7049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-1/" }, { "reference_url": "https://usn.ubuntu.com/7049-2/", "reference_id": "USN-7049-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-2/" }, { "reference_url": "https://usn.ubuntu.com/7049-3/", "reference_id": "USN-7049-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-8927" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53h9-y2ns-jfh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35780?format=api", "vulnerability_id": "VCID-6g29-te13-kucu", "summary": "Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9026", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75247", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75212", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75243", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75134", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.7518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75202", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00868", "scoring_system": "epss", "scoring_elements": "0.75206", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317144", "reference_id": "2317144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317144" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5", "reference_id": "GHSA-865w-9rf3-2wh5", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:47:58Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5" }, { "reference_url": "https://security.gentoo.org/glsa/202501-11", "reference_id": "GLSA-202501-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10949", "reference_id": "RHSA-2024:10949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10950", "reference_id": "RHSA-2024:10950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10951", "reference_id": "RHSA-2024:10951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10952", "reference_id": "RHSA-2024:10952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://usn.ubuntu.com/7049-1/", "reference_id": "USN-7049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-9026" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6g29-te13-kucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72686?format=api", "vulnerability_id": "VCID-7151-69v8-cqaj", "summary": "php: Integer overflow in the firebird and dblib quoters causing OOB writes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11236", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.556", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55601", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55645", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55628", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.634", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63383", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63398", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11236" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688", "reference_id": "1088688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328522", "reference_id": "2328522", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328522" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv", "reference_id": "GHSA-5hqh-c84r-qjcv", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-24T12:32:23Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv" }, { "reference_url": "https://usn.ubuntu.com/7153-1/", "reference_id": "USN-7153-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7153-1/" }, { "reference_url": "https://usn.ubuntu.com/7157-1/", "reference_id": "USN-7157-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-11236" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7151-69v8-cqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68810?format=api", "vulnerability_id": "VCID-7qqj-hp6m-z7bh", "summary": "php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48572", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48587", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4856", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50713", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378690", "reference_id": "2378690", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378690" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x", "reference_id": "GHSA-453j-q27h-5p8x", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:59:51Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23309", "reference_id": "RHSA-2025:23309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1409", "reference_id": "RHSA-2026:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1412", "reference_id": "RHSA-2026:1412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7648-1/", "reference_id": "USN-7648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-1/" }, { "reference_url": "https://usn.ubuntu.com/7648-2/", "reference_id": "USN-7648-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-6491" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qqj-hp6m-z7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72684?format=api", "vulnerability_id": "VCID-9byf-ymwr-eug8", "summary": "php: Single byte overread with convert.quoted-printable-decode filter", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11233", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72714", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72667", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72709", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72719", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.726", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72676", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11233" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688", "reference_id": "1088688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328521", "reference_id": "2328521", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328521" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43", "reference_id": "GHSA-r977-prxv-hc43", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:59Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7157-1/", "reference_id": "USN-7157-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-1/" }, { "reference_url": "https://usn.ubuntu.com/7157-3/", "reference_id": "USN-7157-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-11233" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9byf-ymwr-eug8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70597?format=api", "vulnerability_id": "VCID-bf18-3zx5-f7gr", "summary": "php: Header parser of http stream wrapper does not handle folded headers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1217", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2253", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22487", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27097", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27053", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26996", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26979", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43814", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43816", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43736", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1217" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355917", "reference_id": "2355917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355917" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g", "reference_id": "GHSA-v8xr-gpvj-cx9g", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y/R:A" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:23:16Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7418", "reference_id": "RHSA-2025:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7431", "reference_id": "RHSA-2025:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7489", "reference_id": "RHSA-2025:7489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7400-1/", "reference_id": "USN-7400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7400-1/" }, { "reference_url": "https://usn.ubuntu.com/7645-1/", "reference_id": "USN-7645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7645-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1217" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf18-3zx5-f7gr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42467?format=api", "vulnerability_id": "VCID-e16f-4ynx-fqb9", "summary": "Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87695", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87709", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.8773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87747", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87741", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87739", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87753", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87752", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87768", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03579", "scoring_system": "epss", "scoring_elements": "0.87775", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/07/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885", "reference_id": "1072885", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291252", "reference_id": "2291252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2291252" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w", "reference_id": "GHSA-w8qr-v226-r27w", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w" }, { "reference_url": "https://security.gentoo.org/glsa/202408-32", "reference_id": "GLSA-202408-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-32" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240726-0001/", "reference_id": "ntap-20240726-0001", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240726-0001/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/", "reference_id": "PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10949", "reference_id": "RHSA-2024:10949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10950", "reference_id": "RHSA-2024:10950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10951", "reference_id": "RHSA-2024:10951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10952", "reference_id": "RHSA-2024:10952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://usn.ubuntu.com/6841-1/", "reference_id": "USN-6841-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6841-1/" }, { "reference_url": "https://usn.ubuntu.com/6841-2/", "reference_id": "USN-6841-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6841-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/", "reference_id": "W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-5458" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e16f-4ynx-fqb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79236?format=api", "vulnerability_id": "VCID-fhh6-shuh-v3am", "summary": "php: potential buffer overflow in php_cli_server_startup_workers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20282", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2012", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20003", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19998", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19968", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179880", "reference_id": "2179880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0848", "reference_id": "RHSA-2023:0848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0848" }, { "reference_url": "https://usn.ubuntu.com/6757-1/", "reference_id": "USN-6757-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6757-1/" }, { "reference_url": "https://usn.ubuntu.com/6757-2/", "reference_id": "USN-6757-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6757-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-4900" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhh6-shuh-v3am" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68662?format=api", "vulnerability_id": "VCID-fyhr-st6h-eker", "summary": "php: PHP Hostname Null Character Vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1220", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1132", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11261", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15741", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15785", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15806", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15804", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15916", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15732", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17152", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379792", "reference_id": "2379792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379792" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r", "reference_id": "GHSA-3cr5-j632-f35r", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:46Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23309", "reference_id": "RHSA-2025:23309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1409", "reference_id": "RHSA-2026:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1412", "reference_id": "RHSA-2026:1412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7648-1/", "reference_id": "USN-7648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-1/" }, { "reference_url": "https://usn.ubuntu.com/7648-2/", "reference_id": "USN-7648-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1220" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fyhr-st6h-eker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70593?format=api", "vulnerability_id": "VCID-nrnn-pgxj-xugg", "summary": "php: Stream HTTP wrapper truncates redirect location to 1024 bytes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72086", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72065", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76182", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76111", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.76197", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00935", "scoring_system": "epss", "scoring_elements": "0.762", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0098", "scoring_system": "epss", "scoring_elements": "0.76802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77393", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77411", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356046", "reference_id": "2356046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356046" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff", "reference_id": "GHSA-52jp-hrpf-2jff", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:55:53Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7418", "reference_id": "RHSA-2025:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7431", "reference_id": "RHSA-2025:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7489", "reference_id": "RHSA-2025:7489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7400-1/", "reference_id": "USN-7400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7400-1/" }, { "reference_url": "https://usn.ubuntu.com/7645-1/", "reference_id": "USN-7645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7645-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1861" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnn-pgxj-xugg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70594?format=api", "vulnerability_id": "VCID-qyx5-b321-2udm", "summary": "php: Stream HTTP wrapper header check might omit basic auth header", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00486", "scoring_system": "epss", "scoring_elements": "0.65377", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00486", "scoring_system": "epss", "scoring_elements": "0.65351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67883", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67868", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67878", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70738", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70679", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356041", "reference_id": "2356041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356041" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528", "reference_id": "GHSA-hgf5-96fm-v528", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:57:12Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7418", "reference_id": "RHSA-2025:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7431", "reference_id": "RHSA-2025:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7489", "reference_id": "RHSA-2025:7489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7400-1/", "reference_id": "USN-7400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7400-1/" }, { "reference_url": "https://usn.ubuntu.com/7645-1/", "reference_id": "USN-7645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7645-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1736" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx5-b321-2udm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70596?format=api", "vulnerability_id": "VCID-t862-kese-z7ae", "summary": "php: libxml streams use wrong content-type header when requesting a redirected resource", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20598", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20657", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20583", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2057", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25048", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25793", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25786", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25739", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356043", "reference_id": "2356043", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356043" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc", "reference_id": "GHSA-p3x9-6h7p-cgfc", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:10:21Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7418", "reference_id": "RHSA-2025:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7431", "reference_id": "RHSA-2025:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7489", "reference_id": "RHSA-2025:7489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7400-1/", "reference_id": "USN-7400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1219" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t862-kese-z7ae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72688?format=api", "vulnerability_id": "VCID-ugx8-uqup-n3b4", "summary": "php: OOB access in ldap_escape", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8932", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51118", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59274", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59241", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59248", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59261", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.5928", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59237", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688", "reference_id": "1088688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327961", "reference_id": "2327961", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327961" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff", "reference_id": "GHSA-g665-fm4p-vhff", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-22T17:41:35Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff" }, { "reference_url": "https://usn.ubuntu.com/7157-1/", "reference_id": "USN-7157-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-1/" }, { "reference_url": "https://usn.ubuntu.com/7157-2/", "reference_id": "USN-7157-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-2/" }, { "reference_url": "https://usn.ubuntu.com/7157-3/", "reference_id": "USN-7157-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7157-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-8932" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ugx8-uqup-n3b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70595?format=api", "vulnerability_id": "VCID-uqrh-9nue-rqgx", "summary": "php: Streams HTTP wrapper does not fail for headers with invalid name and no colon", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.5954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59603", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59605", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00382", "scoring_system": "epss", "scoring_elements": "0.59571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72513", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73362", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73374", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73371", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356042", "reference_id": "2356042", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356042" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44", "reference_id": "GHSA-pcmh-g36c-qc44", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:21:51Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15687", "reference_id": "RHSA-2025:15687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4263", "reference_id": "RHSA-2025:4263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7418", "reference_id": "RHSA-2025:7418", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7418" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7431", "reference_id": "RHSA-2025:7431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7432", "reference_id": "RHSA-2025:7432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7489", "reference_id": "RHSA-2025:7489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7400-1/", "reference_id": "USN-7400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7400-1/" }, { "reference_url": "https://usn.ubuntu.com/7645-1/", "reference_id": "USN-7645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7645-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1734" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqrh-9nue-rqgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68809?format=api", "vulnerability_id": "VCID-uush-g6k9-9ffm", "summary": "php: pgsql extension does not check for errors during escaping", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33187", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33052", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35522", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35471", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35211", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35525", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35493", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36743", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378689", "reference_id": "2378689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378689" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3", "reference_id": "GHSA-hrwm-9436-5mv3", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:08Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23309", "reference_id": "RHSA-2025:23309", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23309" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1409", "reference_id": "RHSA-2026:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1412", "reference_id": "RHSA-2026:1412", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1412" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2470", "reference_id": "RHSA-2026:2470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2470" }, { "reference_url": "https://usn.ubuntu.com/7648-1/", "reference_id": "USN-7648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-1/" }, { "reference_url": "https://usn.ubuntu.com/7648-2/", "reference_id": "USN-7648-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-2/" }, { "reference_url": "https://usn.ubuntu.com/7648-3/", "reference_id": "USN-7648-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7648-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-1735" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uush-g6k9-9ffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35778?format=api", "vulnerability_id": "VCID-v42g-pabn-yqe7", "summary": "Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8925", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85085", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85094", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.84978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.84995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85022", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85045", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.8504", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02395", "scoring_system": "epss", "scoring_elements": "0.85061", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317049", "reference_id": "2317049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317049" }, { "reference_url": "https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32", "reference_id": "GHSA-9pqp-7h25-4f32", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:56:50Z/" } ], "url": "https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32" }, { "reference_url": "https://security.gentoo.org/glsa/202501-11", "reference_id": "GLSA-202501-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10949", "reference_id": "RHSA-2024:10949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10950", "reference_id": "RHSA-2024:10950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10951", "reference_id": "RHSA-2024:10951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10952", "reference_id": "RHSA-2024:10952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7315", "reference_id": "RHSA-2025:7315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7315" }, { "reference_url": "https://usn.ubuntu.com/7049-1/", "reference_id": "USN-7049-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-1/" }, { "reference_url": "https://usn.ubuntu.com/7049-2/", "reference_id": "USN-7049-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-2/" }, { "reference_url": "https://usn.ubuntu.com/7049-3/", "reference_id": "USN-7049-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7049-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-8925" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v42g-pabn-yqe7" } ], "fixing_vulnerabilities": [], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/php7.4@7.4.33-1%252Bdeb11u5" }