Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/php@5.2.6-r6
Typeebuild
Namespacedev-lang
Namephp
Version5.2.6-r6
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.2.12
Latest_non_vulnerable_version8.3.12
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-21m2-srah-5fcn
vulnerability_id VCID-21m2-srah-5fcn
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=234102
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=234102
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
4
reference_url http://marc.info/?l=bugtraq&m=123376588623823&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123376588623823&w=2
5
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
6
reference_url http://news.php.net/php.cvs/51219
reference_id
reference_type
scores
url http://news.php.net/php.cvs/51219
7
reference_url http://osvdb.org/47484
reference_id
reference_type
scores
url http://osvdb.org/47484
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3658.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3658
reference_id
reference_type
scores
0
value 0.10745
scoring_system epss
scoring_elements 0.93363
published_at 2026-04-21T12:55:00Z
1
value 0.10745
scoring_system epss
scoring_elements 0.93304
published_at 2026-04-01T12:55:00Z
2
value 0.10745
scoring_system epss
scoring_elements 0.93312
published_at 2026-04-02T12:55:00Z
3
value 0.10745
scoring_system epss
scoring_elements 0.93318
published_at 2026-04-04T12:55:00Z
4
value 0.10745
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-07T12:55:00Z
5
value 0.10745
scoring_system epss
scoring_elements 0.93325
published_at 2026-04-08T12:55:00Z
6
value 0.10745
scoring_system epss
scoring_elements 0.93329
published_at 2026-04-09T12:55:00Z
7
value 0.10745
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-11T12:55:00Z
8
value 0.10745
scoring_system epss
scoring_elements 0.93332
published_at 2026-04-12T12:55:00Z
9
value 0.10745
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-13T12:55:00Z
10
value 0.10745
scoring_system epss
scoring_elements 0.93351
published_at 2026-04-16T12:55:00Z
11
value 0.10745
scoring_system epss
scoring_elements 0.93356
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3658
10
reference_url http://secunia.com/advisories/31982
reference_id
reference_type
scores
url http://secunia.com/advisories/31982
11
reference_url http://secunia.com/advisories/32148
reference_id
reference_type
scores
url http://secunia.com/advisories/32148
12
reference_url http://secunia.com/advisories/32316
reference_id
reference_type
scores
url http://secunia.com/advisories/32316
13
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
14
reference_url http://secunia.com/advisories/32884
reference_id
reference_type
scores
url http://secunia.com/advisories/32884
15
reference_url http://secunia.com/advisories/33797
reference_id
reference_type
scores
url http://secunia.com/advisories/33797
16
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
17
reference_url http://secunia.com/advisories/35306
reference_id
reference_type
scores
url http://secunia.com/advisories/35306
18
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44401
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44401
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9724
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9724
21
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
22
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
23
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
24
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
25
reference_url http://www.debian.org/security/2008/dsa-1647
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1647
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
28
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
30
reference_url http://www.openwall.com/lists/oss-security/2008/08/08/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/08/2
31
reference_url http://www.openwall.com/lists/oss-security/2008/08/13/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/13/8
32
reference_url http://www.php.net/archive/2008.php#id2008-08-07-1
reference_id
reference_type
scores
url http://www.php.net/archive/2008.php#id2008-08-07-1
33
reference_url http://www.redhat.com/support/errata/RHSA-2009-0350.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0350.html
34
reference_url http://www.securityfocus.com/archive/1/498647/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498647/100/0/threaded
35
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
36
reference_url http://www.securityfocus.com/bid/30649
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30649
37
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
38
reference_url http://www.vupen.com/english/advisories/2008/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2336
39
reference_url http://www.vupen.com/english/advisories/2008/3275
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3275
40
reference_url http://www.vupen.com/english/advisories/2009/0320
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0320
41
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=459529
reference_id 459529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=459529
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3658
reference_id CVE-2008-3658
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3658
60
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
61
reference_url https://access.redhat.com/errata/RHSA-2009:0337
reference_id RHSA-2009:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0337
62
reference_url https://access.redhat.com/errata/RHSA-2009:0338
reference_id RHSA-2009:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0338
63
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-3658
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21m2-srah-5fcn
1
url VCID-3shx-e17g-suat
vulnerability_id VCID-3shx-e17g-suat
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2107.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2107
reference_id
reference_type
scores
0
value 0.03088
scoring_system epss
scoring_elements 0.86722
published_at 2026-04-01T12:55:00Z
1
value 0.03088
scoring_system epss
scoring_elements 0.86733
published_at 2026-04-02T12:55:00Z
2
value 0.03088
scoring_system epss
scoring_elements 0.86752
published_at 2026-04-04T12:55:00Z
3
value 0.03088
scoring_system epss
scoring_elements 0.86751
published_at 2026-04-07T12:55:00Z
4
value 0.03088
scoring_system epss
scoring_elements 0.8677
published_at 2026-04-08T12:55:00Z
5
value 0.03088
scoring_system epss
scoring_elements 0.86779
published_at 2026-04-09T12:55:00Z
6
value 0.03088
scoring_system epss
scoring_elements 0.86793
published_at 2026-04-11T12:55:00Z
7
value 0.03088
scoring_system epss
scoring_elements 0.86789
published_at 2026-04-12T12:55:00Z
8
value 0.03088
scoring_system epss
scoring_elements 0.86785
published_at 2026-04-13T12:55:00Z
9
value 0.03088
scoring_system epss
scoring_elements 0.868
published_at 2026-04-16T12:55:00Z
10
value 0.03088
scoring_system epss
scoring_elements 0.86804
published_at 2026-04-18T12:55:00Z
11
value 0.03088
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2107
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445684
reference_id 445684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445684
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://access.redhat.com/errata/RHSA-2008:0544
reference_id RHSA-2008:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0544
5
reference_url https://access.redhat.com/errata/RHSA-2008:0545
reference_id RHSA-2008:0545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0545
6
reference_url https://access.redhat.com/errata/RHSA-2008:0546
reference_id RHSA-2008:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0546
7
reference_url https://access.redhat.com/errata/RHSA-2008:0582
reference_id RHSA-2008:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0582
8
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2107
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3shx-e17g-suat
2
url VCID-4urv-z3q8-gfc3
vulnerability_id VCID-4urv-z3q8-gfc3
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=234102
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=234102
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
3
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
4
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3660.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3660
reference_id
reference_type
scores
0
value 0.1412
scoring_system epss
scoring_elements 0.94384
published_at 2026-04-21T12:55:00Z
1
value 0.1412
scoring_system epss
scoring_elements 0.94377
published_at 2026-04-16T12:55:00Z
2
value 0.1412
scoring_system epss
scoring_elements 0.94382
published_at 2026-04-18T12:55:00Z
3
value 0.15974
scoring_system epss
scoring_elements 0.94745
published_at 2026-04-07T12:55:00Z
4
value 0.15974
scoring_system epss
scoring_elements 0.94754
published_at 2026-04-08T12:55:00Z
5
value 0.15974
scoring_system epss
scoring_elements 0.94731
published_at 2026-04-01T12:55:00Z
6
value 0.15974
scoring_system epss
scoring_elements 0.94762
published_at 2026-04-11T12:55:00Z
7
value 0.15974
scoring_system epss
scoring_elements 0.94766
published_at 2026-04-13T12:55:00Z
8
value 0.15974
scoring_system epss
scoring_elements 0.94758
published_at 2026-04-09T12:55:00Z
9
value 0.15974
scoring_system epss
scoring_elements 0.9474
published_at 2026-04-02T12:55:00Z
10
value 0.15974
scoring_system epss
scoring_elements 0.94744
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3660
7
reference_url http://secunia.com/advisories/31982
reference_id
reference_type
scores
url http://secunia.com/advisories/31982
8
reference_url http://secunia.com/advisories/32148
reference_id
reference_type
scores
url http://secunia.com/advisories/32148
9
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
10
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
11
reference_url http://secunia.com/advisories/35306
reference_id
reference_type
scores
url http://secunia.com/advisories/35306
12
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
13
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44402
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44402
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9597
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9597
16
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
19
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
20
reference_url http://www.debian.org/security/2008/dsa-1647
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1647
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
25
reference_url http://www.openwall.com/lists/oss-security/2008/08/08/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/08/2
26
reference_url http://www.openwall.com/lists/oss-security/2008/08/13/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/13/8
27
reference_url http://www.redhat.com/support/errata/RHSA-2009-0350.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0350.html
28
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
29
reference_url http://www.securitytracker.com/id?1020994
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020994
30
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
31
reference_url http://www.vupen.com/english/advisories/2008/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2336
32
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=459572
reference_id 459572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=459572
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3660
reference_id CVE-2008-3660
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3660
51
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
52
reference_url https://access.redhat.com/errata/RHSA-2009:0337
reference_id RHSA-2009:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0337
53
reference_url https://access.redhat.com/errata/RHSA-2009:0338
reference_id RHSA-2009:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0338
54
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-3660
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4urv-z3q8-gfc3
3
url VCID-6dhr-bpqk-gfds
vulnerability_id VCID-6dhr-bpqk-gfds
summary
A buffer overflow vulnerability has been discovered in PCRE, allowing for
    the execution of arbitrary code and a Denial of Service.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=228091
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=228091
1
reference_url http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes
2
reference_url http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
5
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
6
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2371.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2371
reference_id
reference_type
scores
0
value 0.04128
scoring_system epss
scoring_elements 0.8865
published_at 2026-04-21T12:55:00Z
1
value 0.04128
scoring_system epss
scoring_elements 0.88586
published_at 2026-04-01T12:55:00Z
2
value 0.04128
scoring_system epss
scoring_elements 0.88595
published_at 2026-04-02T12:55:00Z
3
value 0.04128
scoring_system epss
scoring_elements 0.88612
published_at 2026-04-04T12:55:00Z
4
value 0.04128
scoring_system epss
scoring_elements 0.88614
published_at 2026-04-07T12:55:00Z
5
value 0.04128
scoring_system epss
scoring_elements 0.88632
published_at 2026-04-08T12:55:00Z
6
value 0.04128
scoring_system epss
scoring_elements 0.88637
published_at 2026-04-09T12:55:00Z
7
value 0.04128
scoring_system epss
scoring_elements 0.88649
published_at 2026-04-11T12:55:00Z
8
value 0.04128
scoring_system epss
scoring_elements 0.88641
published_at 2026-04-13T12:55:00Z
9
value 0.04128
scoring_system epss
scoring_elements 0.88655
published_at 2026-04-16T12:55:00Z
10
value 0.04128
scoring_system epss
scoring_elements 0.88651
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2371
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371
10
reference_url http://secunia.com/advisories/30916
reference_id
reference_type
scores
url http://secunia.com/advisories/30916
11
reference_url http://secunia.com/advisories/30944
reference_id
reference_type
scores
url http://secunia.com/advisories/30944
12
reference_url http://secunia.com/advisories/30945
reference_id
reference_type
scores
url http://secunia.com/advisories/30945
13
reference_url http://secunia.com/advisories/30958
reference_id
reference_type
scores
url http://secunia.com/advisories/30958
14
reference_url http://secunia.com/advisories/30961
reference_id
reference_type
scores
url http://secunia.com/advisories/30961
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/30972
reference_id
reference_type
scores
url http://secunia.com/advisories/30972
17
reference_url http://secunia.com/advisories/30990
reference_id
reference_type
scores
url http://secunia.com/advisories/30990
18
reference_url http://secunia.com/advisories/31200
reference_id
reference_type
scores
url http://secunia.com/advisories/31200
19
reference_url http://secunia.com/advisories/32222
reference_id
reference_type
scores
url http://secunia.com/advisories/32222
20
reference_url http://secunia.com/advisories/32454
reference_id
reference_type
scores
url http://secunia.com/advisories/32454
21
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
22
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
23
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
24
reference_url http://secunia.com/advisories/39300
reference_id
reference_type
scores
url http://secunia.com/advisories/39300
25
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
26
reference_url http://support.apple.com/kb/HT3216
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3216
27
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
28
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
29
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
30
reference_url http://ubuntu.com/usn/usn-624-2
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-624-2
31
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305
32
reference_url http://www.debian.org/security/2008/dsa-1602
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1602
33
reference_url http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
34
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
35
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
36
reference_url http://www.securityfocus.com/archive/1/497828/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/497828/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/30087
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30087
38
reference_url http://www.securityfocus.com/bid/31681
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31681
39
reference_url http://www.ubuntu.com/usn/usn-624-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-624-1
40
reference_url http://www.ubuntu.com/usn/usn-628-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-628-1
41
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
42
reference_url http://www.vupen.com/english/advisories/2008/2005
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2005
43
reference_url http://www.vupen.com/english/advisories/2008/2006
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2006
44
reference_url http://www.vupen.com/english/advisories/2008/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2336
45
reference_url http://www.vupen.com/english/advisories/2008/2780
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2780
46
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
47
reference_url http://www.vupen.com/english/advisories/2010/0833
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0833
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452079
reference_id 452079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452079
49
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919
reference_id 488919
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:7.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2371
reference_id CVE-2008-2371
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2371
62
reference_url https://security.gentoo.org/glsa/200807-03
reference_id GLSA-200807-03
reference_type
scores
url https://security.gentoo.org/glsa/200807-03
63
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
64
reference_url https://usn.ubuntu.com/624-1/
reference_id USN-624-1
reference_type
scores
url https://usn.ubuntu.com/624-1/
65
reference_url https://usn.ubuntu.com/624-2/
reference_id USN-624-2
reference_type
scores
url https://usn.ubuntu.com/624-2/
66
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2371
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhr-bpqk-gfds
4
url VCID-6v11-qb34-5ydb
vulnerability_id VCID-6v11-qb34-5ydb
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=234102
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=234102
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
4
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
5
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
6
reference_url http://news.php.net/php.cvs/52002
reference_id
reference_type
scores
url http://news.php.net/php.cvs/52002
7
reference_url http://osvdb.org/47483
reference_id
reference_type
scores
url http://osvdb.org/47483
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3659.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3659
reference_id
reference_type
scores
0
value 0.14232
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-21T12:55:00Z
1
value 0.14232
scoring_system epss
scoring_elements 0.94351
published_at 2026-04-01T12:55:00Z
2
value 0.14232
scoring_system epss
scoring_elements 0.9436
published_at 2026-04-02T12:55:00Z
3
value 0.14232
scoring_system epss
scoring_elements 0.9437
published_at 2026-04-04T12:55:00Z
4
value 0.14232
scoring_system epss
scoring_elements 0.94371
published_at 2026-04-07T12:55:00Z
5
value 0.14232
scoring_system epss
scoring_elements 0.94381
published_at 2026-04-08T12:55:00Z
6
value 0.14232
scoring_system epss
scoring_elements 0.94385
published_at 2026-04-09T12:55:00Z
7
value 0.14232
scoring_system epss
scoring_elements 0.94388
published_at 2026-04-11T12:55:00Z
8
value 0.14232
scoring_system epss
scoring_elements 0.94389
published_at 2026-04-12T12:55:00Z
9
value 0.14232
scoring_system epss
scoring_elements 0.9439
published_at 2026-04-13T12:55:00Z
10
value 0.14232
scoring_system epss
scoring_elements 0.94405
published_at 2026-04-16T12:55:00Z
11
value 0.14232
scoring_system epss
scoring_elements 0.9441
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3659
10
reference_url http://secunia.com/advisories/31982
reference_id
reference_type
scores
url http://secunia.com/advisories/31982
11
reference_url http://secunia.com/advisories/32148
reference_id
reference_type
scores
url http://secunia.com/advisories/32148
12
reference_url http://secunia.com/advisories/32316
reference_id
reference_type
scores
url http://secunia.com/advisories/32316
13
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
14
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
15
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
16
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44405
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44405
18
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
19
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
20
reference_url http://www.debian.org/security/2008/dsa-1647
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1647
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:021
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:024
25
reference_url http://www.openwall.com/lists/oss-security/2008/08/08/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/08/2
26
reference_url http://www.openwall.com/lists/oss-security/2008/08/08/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/08/3
27
reference_url http://www.openwall.com/lists/oss-security/2008/08/08/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/08/4
28
reference_url http://www.openwall.com/lists/oss-security/2008/08/13/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/13/8
29
reference_url http://www.php.net/archive/2008.php#id2008-08-07-1
reference_id
reference_type
scores
url http://www.php.net/archive/2008.php#id2008-08-07-1
30
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
31
reference_url http://www.securitytracker.com/id?1020995
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020995
32
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
33
reference_url http://www.vupen.com/english/advisories/2008/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2336
34
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=459569
reference_id 459569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=459569
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3659
reference_id CVE-2008-3659
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3659
53
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
54
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-3659
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6v11-qb34-5ydb
5
url VCID-746p-yjt4-jkfh
vulnerability_id VCID-746p-yjt4-jkfh
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
1
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
2
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2665.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2665
reference_id
reference_type
scores
0
value 0.0309
scoring_system epss
scoring_elements 0.86804
published_at 2026-04-21T12:55:00Z
1
value 0.0309
scoring_system epss
scoring_elements 0.86724
published_at 2026-04-01T12:55:00Z
2
value 0.0309
scoring_system epss
scoring_elements 0.86734
published_at 2026-04-02T12:55:00Z
3
value 0.0309
scoring_system epss
scoring_elements 0.86754
published_at 2026-04-04T12:55:00Z
4
value 0.0309
scoring_system epss
scoring_elements 0.86753
published_at 2026-04-07T12:55:00Z
5
value 0.0309
scoring_system epss
scoring_elements 0.86772
published_at 2026-04-08T12:55:00Z
6
value 0.0309
scoring_system epss
scoring_elements 0.86781
published_at 2026-04-09T12:55:00Z
7
value 0.0309
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-11T12:55:00Z
8
value 0.0309
scoring_system epss
scoring_elements 0.86791
published_at 2026-04-12T12:55:00Z
9
value 0.0309
scoring_system epss
scoring_elements 0.86786
published_at 2026-04-13T12:55:00Z
10
value 0.0309
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-16T12:55:00Z
11
value 0.0309
scoring_system epss
scoring_elements 0.86806
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2665
5
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
6
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
7
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
8
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
9
reference_url http://securityreason.com/achievement_securityalert/54
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/54
10
reference_url http://securityreason.com/securityalert/3941
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3941
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43196
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43196
12
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
13
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
14
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/29797
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29797
16
reference_url http://www.securitytracker.com/id?1020327
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020327
17
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
18
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452206
reference_id 452206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452206
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2665
reference_id CVE-2008-2665
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-2665
22
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2665
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-746p-yjt4-jkfh
6
url VCID-7np8-1zn4-zqdn
vulnerability_id VCID-7np8-1zn4-zqdn
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1384
reference_id
reference_type
scores
0
value 0.0237
scoring_system epss
scoring_elements 0.84879
published_at 2026-04-01T12:55:00Z
1
value 0.0237
scoring_system epss
scoring_elements 0.84895
published_at 2026-04-02T12:55:00Z
2
value 0.0237
scoring_system epss
scoring_elements 0.84912
published_at 2026-04-04T12:55:00Z
3
value 0.0237
scoring_system epss
scoring_elements 0.84917
published_at 2026-04-07T12:55:00Z
4
value 0.0237
scoring_system epss
scoring_elements 0.8494
published_at 2026-04-08T12:55:00Z
5
value 0.0237
scoring_system epss
scoring_elements 0.84947
published_at 2026-04-09T12:55:00Z
6
value 0.0237
scoring_system epss
scoring_elements 0.84963
published_at 2026-04-11T12:55:00Z
7
value 0.0237
scoring_system epss
scoring_elements 0.8496
published_at 2026-04-12T12:55:00Z
8
value 0.0237
scoring_system epss
scoring_elements 0.84955
published_at 2026-04-13T12:55:00Z
9
value 0.0237
scoring_system epss
scoring_elements 0.84977
published_at 2026-04-16T12:55:00Z
10
value 0.0237
scoring_system epss
scoring_elements 0.84978
published_at 2026-04-18T12:55:00Z
11
value 0.0237
scoring_system epss
scoring_elements 0.84975
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1384
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=439298
reference_id 439298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=439298
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-1384
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7np8-1zn4-zqdn
7
url VCID-7x5g-2nwg-8kh6
vulnerability_id VCID-7x5g-2nwg-8kh6
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2050.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2050
reference_id
reference_type
scores
0
value 0.06654
scoring_system epss
scoring_elements 0.91161
published_at 2026-04-01T12:55:00Z
1
value 0.06654
scoring_system epss
scoring_elements 0.91167
published_at 2026-04-02T12:55:00Z
2
value 0.06654
scoring_system epss
scoring_elements 0.91175
published_at 2026-04-04T12:55:00Z
3
value 0.06654
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-07T12:55:00Z
4
value 0.06654
scoring_system epss
scoring_elements 0.91196
published_at 2026-04-08T12:55:00Z
5
value 0.06654
scoring_system epss
scoring_elements 0.91202
published_at 2026-04-09T12:55:00Z
6
value 0.06654
scoring_system epss
scoring_elements 0.91209
published_at 2026-04-11T12:55:00Z
7
value 0.06654
scoring_system epss
scoring_elements 0.91212
published_at 2026-04-13T12:55:00Z
8
value 0.06654
scoring_system epss
scoring_elements 0.91236
published_at 2026-04-16T12:55:00Z
9
value 0.06654
scoring_system epss
scoring_elements 0.91235
published_at 2026-04-18T12:55:00Z
10
value 0.06654
scoring_system epss
scoring_elements 0.91237
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2050
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445002
reference_id 445002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445002
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2050
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7x5g-2nwg-8kh6
8
url VCID-89gs-mhbc-dyda
vulnerability_id VCID-89gs-mhbc-dyda
summary
A buffer overflow vulnerability has been discovered in PCRE, allowing for
    the execution of arbitrary code and Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0674
reference_id
reference_type
scores
0
value 0.2096
scoring_system epss
scoring_elements 0.95601
published_at 2026-04-01T12:55:00Z
1
value 0.2096
scoring_system epss
scoring_elements 0.9561
published_at 2026-04-02T12:55:00Z
2
value 0.2096
scoring_system epss
scoring_elements 0.95615
published_at 2026-04-04T12:55:00Z
3
value 0.2096
scoring_system epss
scoring_elements 0.95618
published_at 2026-04-07T12:55:00Z
4
value 0.2096
scoring_system epss
scoring_elements 0.95626
published_at 2026-04-08T12:55:00Z
5
value 0.2096
scoring_system epss
scoring_elements 0.95629
published_at 2026-04-09T12:55:00Z
6
value 0.2096
scoring_system epss
scoring_elements 0.95635
published_at 2026-04-12T12:55:00Z
7
value 0.2096
scoring_system epss
scoring_elements 0.95637
published_at 2026-04-13T12:55:00Z
8
value 0.2096
scoring_system epss
scoring_elements 0.95646
published_at 2026-04-16T12:55:00Z
9
value 0.2096
scoring_system epss
scoring_elements 0.95649
published_at 2026-04-18T12:55:00Z
10
value 0.2096
scoring_system epss
scoring_elements 0.9565
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431660
reference_id 431660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431660
4
reference_url https://security.gentoo.org/glsa/200803-24
reference_id GLSA-200803-24
reference_type
scores
url https://security.gentoo.org/glsa/200803-24
5
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
6
reference_url https://usn.ubuntu.com/581-1/
reference_id USN-581-1
reference_type
scores
url https://usn.ubuntu.com/581-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-0674
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89gs-mhbc-dyda
9
url VCID-cthn-r5ae-qucm
vulnerability_id VCID-cthn-r5ae-qucm
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2051
reference_id
reference_type
scores
0
value 0.06485
scoring_system epss
scoring_elements 0.91042
published_at 2026-04-01T12:55:00Z
1
value 0.06485
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-02T12:55:00Z
2
value 0.06485
scoring_system epss
scoring_elements 0.91056
published_at 2026-04-04T12:55:00Z
3
value 0.06485
scoring_system epss
scoring_elements 0.91065
published_at 2026-04-07T12:55:00Z
4
value 0.06485
scoring_system epss
scoring_elements 0.91077
published_at 2026-04-08T12:55:00Z
5
value 0.06485
scoring_system epss
scoring_elements 0.91083
published_at 2026-04-09T12:55:00Z
6
value 0.06485
scoring_system epss
scoring_elements 0.91092
published_at 2026-04-13T12:55:00Z
7
value 0.06485
scoring_system epss
scoring_elements 0.91116
published_at 2026-04-18T12:55:00Z
8
value 0.06485
scoring_system epss
scoring_elements 0.91119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2051
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445006
reference_id 445006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445006
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://access.redhat.com/errata/RHSA-2008:0544
reference_id RHSA-2008:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0544
5
reference_url https://access.redhat.com/errata/RHSA-2008:0545
reference_id RHSA-2008:0545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0545
6
reference_url https://access.redhat.com/errata/RHSA-2008:0546
reference_id RHSA-2008:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0546
7
reference_url https://access.redhat.com/errata/RHSA-2008:0582
reference_id RHSA-2008:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0582
8
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2051
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cthn-r5ae-qucm
10
url VCID-f9wq-evsy-4qc8
vulnerability_id VCID-f9wq-evsy-4qc8
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2108.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2108
reference_id
reference_type
scores
0
value 0.05607
scoring_system epss
scoring_elements 0.90279
published_at 2026-04-01T12:55:00Z
1
value 0.05607
scoring_system epss
scoring_elements 0.90282
published_at 2026-04-02T12:55:00Z
2
value 0.05607
scoring_system epss
scoring_elements 0.90295
published_at 2026-04-04T12:55:00Z
3
value 0.05607
scoring_system epss
scoring_elements 0.903
published_at 2026-04-07T12:55:00Z
4
value 0.05607
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-08T12:55:00Z
5
value 0.05607
scoring_system epss
scoring_elements 0.90321
published_at 2026-04-09T12:55:00Z
6
value 0.05607
scoring_system epss
scoring_elements 0.90329
published_at 2026-04-11T12:55:00Z
7
value 0.05607
scoring_system epss
scoring_elements 0.90328
published_at 2026-04-12T12:55:00Z
8
value 0.05607
scoring_system epss
scoring_elements 0.90322
published_at 2026-04-13T12:55:00Z
9
value 0.05607
scoring_system epss
scoring_elements 0.90338
published_at 2026-04-18T12:55:00Z
10
value 0.05607
scoring_system epss
scoring_elements 0.90335
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2108
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445685
reference_id 445685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445685
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://access.redhat.com/errata/RHSA-2008:0544
reference_id RHSA-2008:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0544
5
reference_url https://access.redhat.com/errata/RHSA-2008:0545
reference_id RHSA-2008:0545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0545
6
reference_url https://access.redhat.com/errata/RHSA-2008:0546
reference_id RHSA-2008:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0546
7
reference_url https://access.redhat.com/errata/RHSA-2008:0582
reference_id RHSA-2008:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0582
8
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2108
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9wq-evsy-4qc8
11
url VCID-h6z6-uwnc-u7hj
vulnerability_id VCID-h6z6-uwnc-u7hj
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
1
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
2
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2666.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2666
reference_id
reference_type
scores
0
value 0.07274
scoring_system epss
scoring_elements 0.91672
published_at 2026-04-21T12:55:00Z
1
value 0.07274
scoring_system epss
scoring_elements 0.91617
published_at 2026-04-01T12:55:00Z
2
value 0.07274
scoring_system epss
scoring_elements 0.91624
published_at 2026-04-02T12:55:00Z
3
value 0.07274
scoring_system epss
scoring_elements 0.9163
published_at 2026-04-04T12:55:00Z
4
value 0.07274
scoring_system epss
scoring_elements 0.91638
published_at 2026-04-07T12:55:00Z
5
value 0.07274
scoring_system epss
scoring_elements 0.9165
published_at 2026-04-08T12:55:00Z
6
value 0.07274
scoring_system epss
scoring_elements 0.91656
published_at 2026-04-09T12:55:00Z
7
value 0.07274
scoring_system epss
scoring_elements 0.9166
published_at 2026-04-11T12:55:00Z
8
value 0.07274
scoring_system epss
scoring_elements 0.91662
published_at 2026-04-12T12:55:00Z
9
value 0.07274
scoring_system epss
scoring_elements 0.91659
published_at 2026-04-13T12:55:00Z
10
value 0.07274
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2666
5
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
6
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
7
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
8
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
9
reference_url http://securityreason.com/achievement_securityalert/55
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/55
10
reference_url http://securityreason.com/securityalert/3942
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3942
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43198
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43198
12
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
13
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
14
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/29796
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29796
16
reference_url http://www.securitytracker.com/id?1020328
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020328
17
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
18
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452207
reference_id 452207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452207
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2666
reference_id CVE-2008-2666
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-2666
44
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/31937.txt
reference_id CVE-2008-2666;OSVDB-46638
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/31937.txt
45
reference_url https://www.securityfocus.com/bid/29796/info
reference_id CVE-2008-2666;OSVDB-46638
reference_type exploit
scores
url https://www.securityfocus.com/bid/29796/info
46
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2666
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6z6-uwnc-u7hj
12
url VCID-x1em-879j-3uf5
vulnerability_id VCID-x1em-879j-3uf5
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://bugs.php.net/bug.php?id=42862
reference_id
reference_type
scores
url http://bugs.php.net/bug.php?id=42862
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
3
reference_url http://marc.info/?l=bugtraq&m=124654546101607&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=124654546101607&w=2
4
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
5
reference_url http://osvdb.org/46641
reference_id
reference_type
scores
url http://osvdb.org/46641
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2829.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2829
reference_id
reference_type
scores
0
value 0.09637
scoring_system epss
scoring_elements 0.92912
published_at 2026-04-21T12:55:00Z
1
value 0.09637
scoring_system epss
scoring_elements 0.92868
published_at 2026-04-01T12:55:00Z
2
value 0.09637
scoring_system epss
scoring_elements 0.92875
published_at 2026-04-02T12:55:00Z
3
value 0.09637
scoring_system epss
scoring_elements 0.92879
published_at 2026-04-04T12:55:00Z
4
value 0.09637
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-07T12:55:00Z
5
value 0.09637
scoring_system epss
scoring_elements 0.92885
published_at 2026-04-08T12:55:00Z
6
value 0.09637
scoring_system epss
scoring_elements 0.92889
published_at 2026-04-09T12:55:00Z
7
value 0.09637
scoring_system epss
scoring_elements 0.92894
published_at 2026-04-13T12:55:00Z
8
value 0.09637
scoring_system epss
scoring_elements 0.92893
published_at 2026-04-12T12:55:00Z
9
value 0.09637
scoring_system epss
scoring_elements 0.92904
published_at 2026-04-16T12:55:00Z
10
value 0.09637
scoring_system epss
scoring_elements 0.92906
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2829
8
reference_url https://bugs.gentoo.org/show_bug.cgi?id=221969
reference_id
reference_type
scores
url https://bugs.gentoo.org/show_bug.cgi?id=221969
9
reference_url http://secunia.com/advisories/31200
reference_id
reference_type
scores
url http://secunia.com/advisories/31200
10
reference_url http://secunia.com/advisories/32746
reference_id
reference_type
scores
url http://secunia.com/advisories/32746
11
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
12
reference_url http://secunia.com/advisories/35306
reference_id
reference_type
scores
url http://secunia.com/advisories/35306
13
reference_url http://secunia.com/advisories/35650
reference_id
reference_type
scores
url http://secunia.com/advisories/35650
14
reference_url http://security.gentoo.org/glsa/glsa-200811-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200811-05.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43357
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43357
16
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
19
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0035
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0035
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:128
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:128
23
reference_url http://www.openwall.com/lists/oss-security/2008/06/19/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/06/19/6
24
reference_url http://www.openwall.com/lists/oss-security/2008/06/24/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/06/24/2
25
reference_url http://www.securityfocus.com/archive/1/501376/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501376/100/0/threaded
26
reference_url http://www.securityfocus.com/bid/29829
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29829
27
reference_url http://www.ubuntu.com/usn/usn-628-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-628-1
28
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
29
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=452808
reference_id 452808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=452808
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2829
reference_id CVE-2008-2829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2829
39
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
40
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-2829
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1em-879j-3uf5
13
url VCID-ywkk-h3sj-j3c8
vulnerability_id VCID-ywkk-h3sj-j3c8
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0599.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0599
reference_id
reference_type
scores
0
value 0.38875
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-01T12:55:00Z
1
value 0.38875
scoring_system epss
scoring_elements 0.97242
published_at 2026-04-02T12:55:00Z
2
value 0.38875
scoring_system epss
scoring_elements 0.97247
published_at 2026-04-04T12:55:00Z
3
value 0.38875
scoring_system epss
scoring_elements 0.97248
published_at 2026-04-07T12:55:00Z
4
value 0.38875
scoring_system epss
scoring_elements 0.97255
published_at 2026-04-08T12:55:00Z
5
value 0.38875
scoring_system epss
scoring_elements 0.97256
published_at 2026-04-09T12:55:00Z
6
value 0.38875
scoring_system epss
scoring_elements 0.97259
published_at 2026-04-11T12:55:00Z
7
value 0.38875
scoring_system epss
scoring_elements 0.97261
published_at 2026-04-13T12:55:00Z
8
value 0.38875
scoring_system epss
scoring_elements 0.97268
published_at 2026-04-16T12:55:00Z
9
value 0.38875
scoring_system epss
scoring_elements 0.9727
published_at 2026-04-18T12:55:00Z
10
value 0.38875
scoring_system epss
scoring_elements 0.97273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0599
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=445003
reference_id 445003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=445003
3
reference_url https://security.gentoo.org/glsa/200811-05
reference_id GLSA-200811-05
reference_type
scores
url https://security.gentoo.org/glsa/200811-05
4
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.6-r6
purl pkg:ebuild/dev-lang/php@5.2.6-r6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6
aliases CVE-2008-0599
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywkk-h3sj-j3c8
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.6-r6