Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/php@5.1.6-3.el4s1?arch=8
Typerpm
Namespaceredhat
Namephp
Version5.1.6-3.el4s1
Qualifiers
arch 8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-12my-dqjx-sbdg
vulnerability_id VCID-12my-dqjx-sbdg
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3998
reference_id
reference_type
scores
0
value 0.05887
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-01T12:55:00Z
1
value 0.05887
scoring_system epss
scoring_elements 0.90542
published_at 2026-04-02T12:55:00Z
2
value 0.05887
scoring_system epss
scoring_elements 0.90553
published_at 2026-04-04T12:55:00Z
3
value 0.05887
scoring_system epss
scoring_elements 0.9056
published_at 2026-04-07T12:55:00Z
4
value 0.05887
scoring_system epss
scoring_elements 0.90572
published_at 2026-04-08T12:55:00Z
5
value 0.05887
scoring_system epss
scoring_elements 0.90578
published_at 2026-04-09T12:55:00Z
6
value 0.05887
scoring_system epss
scoring_elements 0.90588
published_at 2026-04-11T12:55:00Z
7
value 0.05887
scoring_system epss
scoring_elements 0.90587
published_at 2026-04-12T12:55:00Z
8
value 0.05887
scoring_system epss
scoring_elements 0.90582
published_at 2026-04-13T12:55:00Z
9
value 0.05887
scoring_system epss
scoring_elements 0.90599
published_at 2026-04-18T12:55:00Z
10
value 0.05887
scoring_system epss
scoring_elements 0.90596
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3998
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276081
reference_id 276081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276081
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
5
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
6
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
7
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
aliases CVE-2007-3998
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12my-dqjx-sbdg
1
url VCID-ggr6-gare-nfca
vulnerability_id VCID-ggr6-gare-nfca
summary php cross-site cookie insertion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3799
reference_id
reference_type
scores
0
value 0.09249
scoring_system epss
scoring_elements 0.92693
published_at 2026-04-01T12:55:00Z
1
value 0.09249
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-02T12:55:00Z
2
value 0.09249
scoring_system epss
scoring_elements 0.92707
published_at 2026-04-04T12:55:00Z
3
value 0.09249
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-07T12:55:00Z
4
value 0.09249
scoring_system epss
scoring_elements 0.92716
published_at 2026-04-08T12:55:00Z
5
value 0.09249
scoring_system epss
scoring_elements 0.9272
published_at 2026-04-09T12:55:00Z
6
value 0.09249
scoring_system epss
scoring_elements 0.92726
published_at 2026-04-11T12:55:00Z
7
value 0.09249
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-13T12:55:00Z
8
value 0.09249
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-18T12:55:00Z
9
value 0.09249
scoring_system epss
scoring_elements 0.92741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3799
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=250726
reference_id 250726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=250726
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30130.txt
reference_id CVE-2007-3799;OSVDB-36855
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30130.txt
4
reference_url https://www.securityfocus.com/bid/24268/info
reference_id CVE-2007-3799;OSVDB-36855
reference_type exploit
scores
url https://www.securityfocus.com/bid/24268/info
5
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
6
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
7
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
8
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
9
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
aliases CVE-2007-3799
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggr6-gare-nfca
2
url VCID-pcat-nj9b-t3au
vulnerability_id VCID-pcat-nj9b-t3au
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4658
reference_id
reference_type
scores
0
value 0.03375
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-01T12:55:00Z
1
value 0.03375
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-02T12:55:00Z
2
value 0.03375
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-04T12:55:00Z
3
value 0.03375
scoring_system epss
scoring_elements 0.87345
published_at 2026-04-07T12:55:00Z
4
value 0.03375
scoring_system epss
scoring_elements 0.87364
published_at 2026-04-08T12:55:00Z
5
value 0.03375
scoring_system epss
scoring_elements 0.87371
published_at 2026-04-09T12:55:00Z
6
value 0.03375
scoring_system epss
scoring_elements 0.87383
published_at 2026-04-11T12:55:00Z
7
value 0.03375
scoring_system epss
scoring_elements 0.87378
published_at 2026-04-12T12:55:00Z
8
value 0.03375
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-13T12:55:00Z
9
value 0.03375
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-16T12:55:00Z
10
value 0.03375
scoring_system epss
scoring_elements 0.87391
published_at 2026-04-18T12:55:00Z
11
value 0.03375
scoring_system epss
scoring_elements 0.87386
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4658
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278011
reference_id 278011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278011
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
5
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
6
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
7
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
aliases CVE-2007-4658
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcat-nj9b-t3au
3
url VCID-svg5-jd8s-mbb5
vulnerability_id VCID-svg5-jd8s-mbb5
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
reference_id
reference_type
scores
0
value 0.09573
scoring_system epss
scoring_elements 0.92838
published_at 2026-04-01T12:55:00Z
1
value 0.09573
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-02T12:55:00Z
2
value 0.09573
scoring_system epss
scoring_elements 0.92849
published_at 2026-04-04T12:55:00Z
3
value 0.09573
scoring_system epss
scoring_elements 0.92847
published_at 2026-04-07T12:55:00Z
4
value 0.09573
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-08T12:55:00Z
5
value 0.09573
scoring_system epss
scoring_elements 0.92859
published_at 2026-04-09T12:55:00Z
6
value 0.09573
scoring_system epss
scoring_elements 0.92864
published_at 2026-04-13T12:55:00Z
7
value 0.09573
scoring_system epss
scoring_elements 0.92874
published_at 2026-04-16T12:55:00Z
8
value 0.09573
scoring_system epss
scoring_elements 0.92875
published_at 2026-04-18T12:55:00Z
9
value 0.09573
scoring_system epss
scoring_elements 0.9288
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278031
reference_id 278031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278031
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
reference_id 443456
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
7
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
8
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
9
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
10
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
11
reference_url https://usn.ubuntu.com/557-1/
reference_id USN-557-1
reference_type
scores
url https://usn.ubuntu.com/557-1/
12
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
aliases CVE-2007-3996
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5
4
url VCID-t6ww-kp28-dfgj
vulnerability_id VCID-t6ww-kp28-dfgj
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
4
reference_url http://osvdb.org/36083
reference_id
reference_type
scores
url http://osvdb.org/36083
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2872
reference_id
reference_type
scores
0
value 0.21049
scoring_system epss
scoring_elements 0.95659
published_at 2026-04-21T12:55:00Z
1
value 0.21049
scoring_system epss
scoring_elements 0.9561
published_at 2026-04-01T12:55:00Z
2
value 0.21049
scoring_system epss
scoring_elements 0.95618
published_at 2026-04-02T12:55:00Z
3
value 0.21049
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-04T12:55:00Z
4
value 0.21049
scoring_system epss
scoring_elements 0.95626
published_at 2026-04-07T12:55:00Z
5
value 0.21049
scoring_system epss
scoring_elements 0.95635
published_at 2026-04-08T12:55:00Z
6
value 0.21049
scoring_system epss
scoring_elements 0.95638
published_at 2026-04-09T12:55:00Z
7
value 0.21049
scoring_system epss
scoring_elements 0.95643
published_at 2026-04-12T12:55:00Z
8
value 0.21049
scoring_system epss
scoring_elements 0.95645
published_at 2026-04-13T12:55:00Z
9
value 0.21049
scoring_system epss
scoring_elements 0.95654
published_at 2026-04-16T12:55:00Z
10
value 0.21049
scoring_system epss
scoring_elements 0.95658
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2872
8
reference_url http://secunia.com/advisories/25456
reference_id
reference_type
scores
url http://secunia.com/advisories/25456
9
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
10
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
11
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
12
reference_url http://secunia.com/advisories/26838
reference_id
reference_type
scores
url http://secunia.com/advisories/26838
13
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
14
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
15
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
16
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
17
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
18
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
19
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
20
reference_url http://secunia.com/advisories/27351
reference_id
reference_type
scores
url http://secunia.com/advisories/27351
21
reference_url http://secunia.com/advisories/27377
reference_id
reference_type
scores
url http://secunia.com/advisories/27377
22
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
23
reference_url http://secunia.com/advisories/27864
reference_id
reference_type
scores
url http://secunia.com/advisories/27864
24
reference_url http://secunia.com/advisories/28318
reference_id
reference_type
scores
url http://secunia.com/advisories/28318
25
reference_url http://secunia.com/advisories/28658
reference_id
reference_type
scores
url http://secunia.com/advisories/28658
26
reference_url http://secunia.com/advisories/28750
reference_id
reference_type
scores
url http://secunia.com/advisories/28750
27
reference_url http://secunia.com/advisories/28936
reference_id
reference_type
scores
url http://secunia.com/advisories/28936
28
reference_url http://secunia.com/advisories/30040
reference_id
reference_type
scores
url http://secunia.com/advisories/30040
29
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
30
reference_url https://issues.rpath.com/browse/RPL-1693
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1693
31
reference_url https://issues.rpath.com/browse/RPL-1702
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1702
32
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
33
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
34
reference_url https://launchpad.net/bugs/173043
reference_id
reference_type
scores
url https://launchpad.net/bugs/173043
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
41
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
42
reference_url http://www.php.net/ChangeLog-4.php
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-4.php
43
reference_url http://www.php.net/releases/4_4_8.php
reference_id
reference_type
scores
url http://www.php.net/releases/4_4_8.php
44
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
45
reference_url http://www.redhat.com/support/errata/RHSA-2007-0888.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0888.html
46
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
48
reference_url http://www.sec-consult.com/291.html
reference_id
reference_type
scores
url http://www.sec-consult.com/291.html
49
reference_url http://www.securityfocus.com/archive/1/470244/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470244/100/0/threaded
50
reference_url http://www.securityfocus.com/archive/1/491693/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/491693/100/0/threaded
51
reference_url http://www.securityfocus.com/bid/24261
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24261
52
reference_url http://www.securitytracker.com/id?1018186
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018186
53
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
54
reference_url http://www.ubuntu.com/usn/usn-549-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-549-2
55
reference_url http://www.vupen.com/english/advisories/2007/2061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2061
56
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
57
reference_url http://www.vupen.com/english/advisories/2008/0059
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0059
58
reference_url http://www.vupen.com/english/advisories/2008/0398
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0398
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242032
reference_id 242032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242032
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2872
reference_id CVE-2007-2872
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2872
78
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php
reference_id CVE-2007-2872;OSVDB-36083
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php
79
reference_url https://www.securityfocus.com/bid/24261/info
reference_id CVE-2007-2872;OSVDB-36083
reference_type exploit
scores
url https://www.securityfocus.com/bid/24261/info
80
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
81
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
82
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
83
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
84
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
85
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
aliases CVE-2007-2872
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ww-kp28-dfgj
5
url VCID-tttf-2akk-57ez
vulnerability_id VCID-tttf-2akk-57ez
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=86
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=86
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://osvdb.org/35788
reference_id
reference_type
scores
url http://osvdb.org/35788
4
reference_url http://osvdb.org/36643
reference_id
reference_type
scores
url http://osvdb.org/36643
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
reference_id
reference_type
scores
0
value 0.06829
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-21T12:55:00Z
1
value 0.06829
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-18T12:55:00Z
2
value 0.06829
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-12T12:55:00Z
3
value 0.06829
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-13T12:55:00Z
4
value 0.06829
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-16T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-11T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
11
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
9
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
10
reference_url http://secunia.com/advisories/25362
reference_id
reference_type
scores
url http://secunia.com/advisories/25362
11
reference_url http://secunia.com/advisories/25378
reference_id
reference_type
scores
url http://secunia.com/advisories/25378
12
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
13
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
14
reference_url http://secunia.com/advisories/25590
reference_id
reference_type
scores
url http://secunia.com/advisories/25590
15
reference_url http://secunia.com/advisories/25646
reference_id
reference_type
scores
url http://secunia.com/advisories/25646
16
reference_url http://secunia.com/advisories/25657
reference_id
reference_type
scores
url http://secunia.com/advisories/25657
17
reference_url http://secunia.com/advisories/25658
reference_id
reference_type
scores
url http://secunia.com/advisories/25658
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
20
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
21
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
22
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
23
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
24
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
25
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
26
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
27
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
28
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
29
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
30
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
31
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
32
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
33
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
34
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
37
reference_url https://issues.rpath.com/browse/RPL-1394
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1394
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
40
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
41
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
42
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
44
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
45
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
47
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
48
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
49
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
50
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
51
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
52
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
53
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
54
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
55
reference_url http://www.securityfocus.com/bid/24089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24089
56
reference_url http://www.securitytracker.com/id?1018187
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018187
57
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
58
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
59
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
60
reference_url http://www.vupen.com/english/advisories/2007/1904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1904
61
reference_url http://www.vupen.com/english/advisories/2007/1905
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1905
62
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
63
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
64
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242033
reference_id 242033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242033
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
reference_id 425584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
67
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
68
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
reference_id CVE-2007-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
71
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
72
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
73
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
74
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
75
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
76
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
77
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
aliases CVE-2007-2756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez
6
url VCID-z18y-5z5q-4yff
vulnerability_id VCID-z18y-5z5q-4yff
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4670
reference_id
reference_type
scores
0
value 0.03601
scoring_system epss
scoring_elements 0.87716
published_at 2026-04-01T12:55:00Z
1
value 0.03601
scoring_system epss
scoring_elements 0.87727
published_at 2026-04-02T12:55:00Z
2
value 0.03601
scoring_system epss
scoring_elements 0.8774
published_at 2026-04-04T12:55:00Z
3
value 0.03601
scoring_system epss
scoring_elements 0.87742
published_at 2026-04-07T12:55:00Z
4
value 0.03601
scoring_system epss
scoring_elements 0.87763
published_at 2026-04-08T12:55:00Z
5
value 0.03601
scoring_system epss
scoring_elements 0.87769
published_at 2026-04-09T12:55:00Z
6
value 0.03601
scoring_system epss
scoring_elements 0.8778
published_at 2026-04-11T12:55:00Z
7
value 0.03601
scoring_system epss
scoring_elements 0.87775
published_at 2026-04-12T12:55:00Z
8
value 0.03601
scoring_system epss
scoring_elements 0.87773
published_at 2026-04-13T12:55:00Z
9
value 0.03601
scoring_system epss
scoring_elements 0.87787
published_at 2026-04-16T12:55:00Z
10
value 0.03601
scoring_system epss
scoring_elements 0.87786
published_at 2026-04-18T12:55:00Z
11
value 0.03601
scoring_system epss
scoring_elements 0.87785
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4670
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278041
reference_id 278041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278041
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
5
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
6
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
7
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
8
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
aliases CVE-2007-4670
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z18y-5z5q-4yff
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.6-3.el4s1%3Farch=8