Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
Typeebuild
Namespacedev-lang
Namephp
Version5.2.4_p20070914-r2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.2.6-r6
Latest_non_vulnerable_version8.3.12
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-12my-dqjx-sbdg
vulnerability_id VCID-12my-dqjx-sbdg
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3998
reference_id
reference_type
scores
0
value 0.05887
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-01T12:55:00Z
1
value 0.05887
scoring_system epss
scoring_elements 0.90542
published_at 2026-04-02T12:55:00Z
2
value 0.05887
scoring_system epss
scoring_elements 0.90553
published_at 2026-04-04T12:55:00Z
3
value 0.05887
scoring_system epss
scoring_elements 0.9056
published_at 2026-04-07T12:55:00Z
4
value 0.05887
scoring_system epss
scoring_elements 0.90572
published_at 2026-04-08T12:55:00Z
5
value 0.05887
scoring_system epss
scoring_elements 0.90578
published_at 2026-04-09T12:55:00Z
6
value 0.05887
scoring_system epss
scoring_elements 0.90588
published_at 2026-04-11T12:55:00Z
7
value 0.05887
scoring_system epss
scoring_elements 0.90587
published_at 2026-04-12T12:55:00Z
8
value 0.05887
scoring_system epss
scoring_elements 0.90582
published_at 2026-04-13T12:55:00Z
9
value 0.05887
scoring_system epss
scoring_elements 0.90599
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3998
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276081
reference_id 276081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276081
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
5
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
6
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
7
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3998
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12my-dqjx-sbdg
1
url VCID-3aaa-rnq9-t7bg
vulnerability_id VCID-3aaa-rnq9-t7bg
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4662
reference_id
reference_type
scores
0
value 0.0442
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-01T12:55:00Z
1
value 0.0442
scoring_system epss
scoring_elements 0.88982
published_at 2026-04-02T12:55:00Z
2
value 0.0442
scoring_system epss
scoring_elements 0.88999
published_at 2026-04-04T12:55:00Z
3
value 0.0442
scoring_system epss
scoring_elements 0.89001
published_at 2026-04-07T12:55:00Z
4
value 0.0442
scoring_system epss
scoring_elements 0.89019
published_at 2026-04-08T12:55:00Z
5
value 0.0442
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-09T12:55:00Z
6
value 0.0442
scoring_system epss
scoring_elements 0.89036
published_at 2026-04-11T12:55:00Z
7
value 0.0442
scoring_system epss
scoring_elements 0.89031
published_at 2026-04-12T12:55:00Z
8
value 0.0442
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-13T12:55:00Z
9
value 0.0442
scoring_system epss
scoring_elements 0.89043
published_at 2026-04-16T12:55:00Z
10
value 0.0442
scoring_system epss
scoring_elements 0.89042
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4662
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278101
reference_id 278101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278101
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4662
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aaa-rnq9-t7bg
2
url VCID-4umw-u24s-mud8
vulnerability_id VCID-4umw-u24s-mud8
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1887.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1887.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1887
reference_id
reference_type
scores
0
value 0.0441
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-18T12:55:00Z
1
value 0.0441
scoring_system epss
scoring_elements 0.88963
published_at 2026-04-01T12:55:00Z
2
value 0.0441
scoring_system epss
scoring_elements 0.8897
published_at 2026-04-02T12:55:00Z
3
value 0.0441
scoring_system epss
scoring_elements 0.88987
published_at 2026-04-04T12:55:00Z
4
value 0.0441
scoring_system epss
scoring_elements 0.88989
published_at 2026-04-07T12:55:00Z
5
value 0.0441
scoring_system epss
scoring_elements 0.89007
published_at 2026-04-08T12:55:00Z
6
value 0.0441
scoring_system epss
scoring_elements 0.89012
published_at 2026-04-09T12:55:00Z
7
value 0.0441
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-11T12:55:00Z
8
value 0.0441
scoring_system epss
scoring_elements 0.89019
published_at 2026-04-12T12:55:00Z
9
value 0.0441
scoring_system epss
scoring_elements 0.89017
published_at 2026-04-13T12:55:00Z
10
value 0.0441
scoring_system epss
scoring_elements 0.89031
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1887
3
reference_url http://secunia.com/advisories/24909
reference_id
reference_type
scores
url http://secunia.com/advisories/24909
4
reference_url http://secunia.com/advisories/25057
reference_id
reference_type
scores
url http://secunia.com/advisories/25057
5
reference_url http://secunia.com/advisories/25062
reference_id
reference_type
scores
url http://secunia.com/advisories/25062
6
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
7
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
8
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33766
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33766
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5348
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5348
11
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
12
reference_url http://www.debian.org/security/2007/dsa-1283
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1283
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
14
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
15
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
16
reference_url http://www.php.net/releases/5_2_1.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_1.php
17
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
18
reference_url http://www.php-security.org/MOPB/MOPB-41-2007.html
reference_id
reference_type
scores
url http://www.php-security.org/MOPB/MOPB-41-2007.html
19
reference_url http://www.securityfocus.com/bid/23235
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23235
20
reference_url http://www.ubuntu.com/usn/usn-455-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-455-1
21
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
22
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1887
reference_id CVE-2007-1887
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1887
29
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
30
reference_url https://usn.ubuntu.com/455-1/
reference_id USN-455-1
reference_type
scores
url https://usn.ubuntu.com/455-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-1887
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4umw-u24s-mud8
3
url VCID-68jr-29vx-k3d1
vulnerability_id VCID-68jr-29vx-k3d1
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4782
reference_id
reference_type
scores
0
value 0.03282
scoring_system epss
scoring_elements 0.87127
published_at 2026-04-01T12:55:00Z
1
value 0.03282
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-02T12:55:00Z
2
value 0.03282
scoring_system epss
scoring_elements 0.87155
published_at 2026-04-04T12:55:00Z
3
value 0.03282
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-07T12:55:00Z
4
value 0.03282
scoring_system epss
scoring_elements 0.87171
published_at 2026-04-08T12:55:00Z
5
value 0.03282
scoring_system epss
scoring_elements 0.87179
published_at 2026-04-09T12:55:00Z
6
value 0.03282
scoring_system epss
scoring_elements 0.87192
published_at 2026-04-11T12:55:00Z
7
value 0.03282
scoring_system epss
scoring_elements 0.87186
published_at 2026-04-12T12:55:00Z
8
value 0.03282
scoring_system epss
scoring_elements 0.87182
published_at 2026-04-13T12:55:00Z
9
value 0.03282
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-16T12:55:00Z
10
value 0.03282
scoring_system epss
scoring_elements 0.87202
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4782
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285881
reference_id 285881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285881
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2008:0544
reference_id RHSA-2008:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0544
5
reference_url https://access.redhat.com/errata/RHSA-2008:0545
reference_id RHSA-2008:0545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0545
6
reference_url https://access.redhat.com/errata/RHSA-2008:0582
reference_id RHSA-2008:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0582
7
reference_url https://usn.ubuntu.com/628-1/
reference_id USN-628-1
reference_type
scores
url https://usn.ubuntu.com/628-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4782
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68jr-29vx-k3d1
4
url VCID-9tjq-wrg8-7bfw
vulnerability_id VCID-9tjq-wrg8-7bfw
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4840
reference_id
reference_type
scores
0
value 0.01592
scoring_system epss
scoring_elements 0.81592
published_at 2026-04-01T12:55:00Z
1
value 0.01592
scoring_system epss
scoring_elements 0.81603
published_at 2026-04-02T12:55:00Z
2
value 0.01592
scoring_system epss
scoring_elements 0.81624
published_at 2026-04-04T12:55:00Z
3
value 0.01592
scoring_system epss
scoring_elements 0.81622
published_at 2026-04-07T12:55:00Z
4
value 0.01592
scoring_system epss
scoring_elements 0.81649
published_at 2026-04-08T12:55:00Z
5
value 0.01592
scoring_system epss
scoring_elements 0.81654
published_at 2026-04-13T12:55:00Z
6
value 0.01592
scoring_system epss
scoring_elements 0.81674
published_at 2026-04-11T12:55:00Z
7
value 0.01592
scoring_system epss
scoring_elements 0.81661
published_at 2026-04-12T12:55:00Z
8
value 0.01592
scoring_system epss
scoring_elements 0.81693
published_at 2026-04-16T12:55:00Z
9
value 0.01592
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4840
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tjq-wrg8-7bfw
5
url VCID-dqky-4tkk-1uh8
vulnerability_id VCID-dqky-4tkk-1uh8
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://bugs.php.net/bug.php?id=41492
reference_id
reference_type
scores
url http://bugs.php.net/bug.php?id=41492
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
2
reference_url http://osvdb.org/36084
reference_id
reference_type
scores
url http://osvdb.org/36084
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3007.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3007.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3007
reference_id
reference_type
scores
0
value 0.01156
scoring_system epss
scoring_elements 0.78588
published_at 2026-04-18T12:55:00Z
1
value 0.01156
scoring_system epss
scoring_elements 0.78511
published_at 2026-04-01T12:55:00Z
2
value 0.01156
scoring_system epss
scoring_elements 0.78518
published_at 2026-04-02T12:55:00Z
3
value 0.01156
scoring_system epss
scoring_elements 0.78548
published_at 2026-04-04T12:55:00Z
4
value 0.01156
scoring_system epss
scoring_elements 0.78532
published_at 2026-04-07T12:55:00Z
5
value 0.01156
scoring_system epss
scoring_elements 0.78558
published_at 2026-04-08T12:55:00Z
6
value 0.01156
scoring_system epss
scoring_elements 0.78563
published_at 2026-04-09T12:55:00Z
7
value 0.01156
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-11T12:55:00Z
8
value 0.01156
scoring_system epss
scoring_elements 0.78569
published_at 2026-04-12T12:55:00Z
9
value 0.01156
scoring_system epss
scoring_elements 0.78561
published_at 2026-04-13T12:55:00Z
10
value 0.01156
scoring_system epss
scoring_elements 0.78589
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3007
5
reference_url http://secunia.com/advisories/25456
reference_id
reference_type
scores
url http://secunia.com/advisories/25456
6
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
7
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
8
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
9
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
10
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
11
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
12
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
13
reference_url http://www.securityfocus.com/bid/24259
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24259
14
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3007
reference_id CVE-2007-3007
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-3007
17
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3007
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqky-4tkk-1uh8
6
url VCID-j7ta-nw6z-e7d9
vulnerability_id VCID-j7ta-nw6z-e7d9
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4660
reference_id
reference_type
scores
0
value 0.0536
scoring_system epss
scoring_elements 0.90041
published_at 2026-04-01T12:55:00Z
1
value 0.0536
scoring_system epss
scoring_elements 0.90044
published_at 2026-04-02T12:55:00Z
2
value 0.0536
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-04T12:55:00Z
3
value 0.0536
scoring_system epss
scoring_elements 0.9006
published_at 2026-04-07T12:55:00Z
4
value 0.0536
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-08T12:55:00Z
5
value 0.0536
scoring_system epss
scoring_elements 0.90081
published_at 2026-04-09T12:55:00Z
6
value 0.0536
scoring_system epss
scoring_elements 0.9009
published_at 2026-04-11T12:55:00Z
7
value 0.0536
scoring_system epss
scoring_elements 0.90088
published_at 2026-04-12T12:55:00Z
8
value 0.0536
scoring_system epss
scoring_elements 0.90082
published_at 2026-04-13T12:55:00Z
9
value 0.0536
scoring_system epss
scoring_elements 0.90099
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4660
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278161
reference_id 278161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278161
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4660
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7ta-nw6z-e7d9
7
url VCID-jjns-fjap-kudd
vulnerability_id VCID-jjns-fjap-kudd
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4825.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4825
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54308
published_at 2026-04-01T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54328
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54358
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54333
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54384
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.5438
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54428
published_at 2026-04-16T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54411
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54389
published_at 2026-04-13T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54432
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4825
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=287971
reference_id 287971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=287971
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4825
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjns-fjap-kudd
8
url VCID-jugt-sr4b-33gf
vulnerability_id VCID-jugt-sr4b-33gf
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4783
reference_id
reference_type
scores
0
value 0.01606
scoring_system epss
scoring_elements 0.81669
published_at 2026-04-01T12:55:00Z
1
value 0.01606
scoring_system epss
scoring_elements 0.8168
published_at 2026-04-02T12:55:00Z
2
value 0.01606
scoring_system epss
scoring_elements 0.81703
published_at 2026-04-04T12:55:00Z
3
value 0.01606
scoring_system epss
scoring_elements 0.817
published_at 2026-04-07T12:55:00Z
4
value 0.01606
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-08T12:55:00Z
5
value 0.01606
scoring_system epss
scoring_elements 0.81732
published_at 2026-04-13T12:55:00Z
6
value 0.01606
scoring_system epss
scoring_elements 0.81751
published_at 2026-04-11T12:55:00Z
7
value 0.01606
scoring_system epss
scoring_elements 0.81738
published_at 2026-04-12T12:55:00Z
8
value 0.01606
scoring_system epss
scoring_elements 0.81771
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4783
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285891
reference_id 285891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285891
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4783
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jugt-sr4b-33gf
9
url VCID-jvht-mr6w-w7eg
vulnerability_id VCID-jvht-mr6w-w7eg
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4659
reference_id
reference_type
scores
0
value 0.04193
scoring_system epss
scoring_elements 0.8867
published_at 2026-04-01T12:55:00Z
1
value 0.04193
scoring_system epss
scoring_elements 0.88679
published_at 2026-04-02T12:55:00Z
2
value 0.04193
scoring_system epss
scoring_elements 0.88696
published_at 2026-04-04T12:55:00Z
3
value 0.04193
scoring_system epss
scoring_elements 0.88697
published_at 2026-04-07T12:55:00Z
4
value 0.04193
scoring_system epss
scoring_elements 0.88714
published_at 2026-04-08T12:55:00Z
5
value 0.04193
scoring_system epss
scoring_elements 0.8872
published_at 2026-04-09T12:55:00Z
6
value 0.04193
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-11T12:55:00Z
7
value 0.04193
scoring_system epss
scoring_elements 0.88726
published_at 2026-04-13T12:55:00Z
8
value 0.04193
scoring_system epss
scoring_elements 0.88739
published_at 2026-04-16T12:55:00Z
9
value 0.04193
scoring_system epss
scoring_elements 0.88737
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4659
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=276531
reference_id 276531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=276531
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4659
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvht-mr6w-w7eg
10
url VCID-nafj-5za7-t7f7
vulnerability_id VCID-nafj-5za7-t7f7
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4657
reference_id
reference_type
scores
0
value 0.02117
scoring_system epss
scoring_elements 0.84061
published_at 2026-04-01T12:55:00Z
1
value 0.02117
scoring_system epss
scoring_elements 0.84074
published_at 2026-04-02T12:55:00Z
2
value 0.02117
scoring_system epss
scoring_elements 0.84091
published_at 2026-04-04T12:55:00Z
3
value 0.02117
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-07T12:55:00Z
4
value 0.02117
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-08T12:55:00Z
5
value 0.02117
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-09T12:55:00Z
6
value 0.02117
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-11T12:55:00Z
7
value 0.02117
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-12T12:55:00Z
8
value 0.02117
scoring_system epss
scoring_elements 0.8413
published_at 2026-04-13T12:55:00Z
9
value 0.02117
scoring_system epss
scoring_elements 0.84152
published_at 2026-04-16T12:55:00Z
10
value 0.02117
scoring_system epss
scoring_elements 0.84154
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4657
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278061
reference_id 278061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278061
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4657
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nafj-5za7-t7f7
11
url VCID-nx18-7bt6-nqhm
vulnerability_id VCID-nx18-7bt6-nqhm
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4663
reference_id
reference_type
scores
0
value 0.01427
scoring_system epss
scoring_elements 0.80576
published_at 2026-04-01T12:55:00Z
1
value 0.01427
scoring_system epss
scoring_elements 0.80583
published_at 2026-04-02T12:55:00Z
2
value 0.01427
scoring_system epss
scoring_elements 0.80605
published_at 2026-04-04T12:55:00Z
3
value 0.01427
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-07T12:55:00Z
4
value 0.01427
scoring_system epss
scoring_elements 0.80626
published_at 2026-04-08T12:55:00Z
5
value 0.01427
scoring_system epss
scoring_elements 0.80635
published_at 2026-04-09T12:55:00Z
6
value 0.01427
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-11T12:55:00Z
7
value 0.01427
scoring_system epss
scoring_elements 0.80638
published_at 2026-04-12T12:55:00Z
8
value 0.01427
scoring_system epss
scoring_elements 0.8063
published_at 2026-04-13T12:55:00Z
9
value 0.01427
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-16T12:55:00Z
10
value 0.01427
scoring_system epss
scoring_elements 0.80661
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4663
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277991
reference_id 277991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277991
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4663
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx18-7bt6-nqhm
12
url VCID-pcat-nj9b-t3au
vulnerability_id VCID-pcat-nj9b-t3au
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4658
reference_id
reference_type
scores
0
value 0.03375
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-01T12:55:00Z
1
value 0.03375
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-02T12:55:00Z
2
value 0.03375
scoring_system epss
scoring_elements 0.87346
published_at 2026-04-04T12:55:00Z
3
value 0.03375
scoring_system epss
scoring_elements 0.87345
published_at 2026-04-07T12:55:00Z
4
value 0.03375
scoring_system epss
scoring_elements 0.87364
published_at 2026-04-08T12:55:00Z
5
value 0.03375
scoring_system epss
scoring_elements 0.87371
published_at 2026-04-09T12:55:00Z
6
value 0.03375
scoring_system epss
scoring_elements 0.87383
published_at 2026-04-11T12:55:00Z
7
value 0.03375
scoring_system epss
scoring_elements 0.87378
published_at 2026-04-12T12:55:00Z
8
value 0.03375
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-13T12:55:00Z
9
value 0.03375
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-16T12:55:00Z
10
value 0.03375
scoring_system epss
scoring_elements 0.87391
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4658
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278011
reference_id 278011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278011
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
5
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
6
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
7
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4658
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcat-nj9b-t3au
13
url VCID-pgs1-b1fw-1bat
vulnerability_id VCID-pgs1-b1fw-1bat
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4661
reference_id
reference_type
scores
0
value 0.03881
scoring_system epss
scoring_elements 0.88187
published_at 2026-04-01T12:55:00Z
1
value 0.03881
scoring_system epss
scoring_elements 0.88195
published_at 2026-04-02T12:55:00Z
2
value 0.03881
scoring_system epss
scoring_elements 0.8821
published_at 2026-04-04T12:55:00Z
3
value 0.03881
scoring_system epss
scoring_elements 0.88216
published_at 2026-04-07T12:55:00Z
4
value 0.03881
scoring_system epss
scoring_elements 0.88236
published_at 2026-04-08T12:55:00Z
5
value 0.03881
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-09T12:55:00Z
6
value 0.03881
scoring_system epss
scoring_elements 0.88253
published_at 2026-04-11T12:55:00Z
7
value 0.03881
scoring_system epss
scoring_elements 0.88246
published_at 2026-04-12T12:55:00Z
8
value 0.03881
scoring_system epss
scoring_elements 0.88245
published_at 2026-04-13T12:55:00Z
9
value 0.03881
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-16T12:55:00Z
10
value 0.03881
scoring_system epss
scoring_elements 0.88258
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4661
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278161
reference_id 278161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278161
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4661
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgs1-b1fw-1bat
14
url VCID-quju-nc1a-kqf9
vulnerability_id VCID-quju-nc1a-kqf9
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1883.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1883
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66282
published_at 2026-04-18T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66157
published_at 2026-04-01T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66199
published_at 2026-04-02T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66225
published_at 2026-04-04T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66195
published_at 2026-04-07T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66242
published_at 2026-04-08T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66255
published_at 2026-04-09T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-11T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66263
published_at 2026-04-12T12:55:00Z
9
value 0.00506
scoring_system epss
scoring_elements 0.66232
published_at 2026-04-13T12:55:00Z
10
value 0.00506
scoring_system epss
scoring_elements 0.66266
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1883
2
reference_url http://secunia.com/advisories/24542
reference_id
reference_type
scores
url http://secunia.com/advisories/24542
3
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33750
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33750
5
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
6
reference_url http://www.php-security.org/MOPB/MOPB-37-2007.html
reference_id
reference_type
scores
url http://www.php-security.org/MOPB/MOPB-37-2007.html
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1883
reference_id CVE-2007-1883
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1883
75
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-1883
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-quju-nc1a-kqf9
15
url VCID-qzv8-12fu-9ba4
vulnerability_id VCID-qzv8-12fu-9ba4
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1900.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1900.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1900
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75443
published_at 2026-04-18T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75341
published_at 2026-04-01T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75344
published_at 2026-04-02T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75376
published_at 2026-04-04T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75356
published_at 2026-04-07T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75399
published_at 2026-04-08T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75408
published_at 2026-04-09T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75428
published_at 2026-04-11T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-12T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75395
published_at 2026-04-13T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75436
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1900
3
reference_url http://secunia.com/advisories/24824
reference_id
reference_type
scores
url http://secunia.com/advisories/24824
4
reference_url http://secunia.com/advisories/25056
reference_id
reference_type
scores
url http://secunia.com/advisories/25056
5
reference_url http://secunia.com/advisories/25057
reference_id
reference_type
scores
url http://secunia.com/advisories/25057
6
reference_url http://secunia.com/advisories/25062
reference_id
reference_type
scores
url http://secunia.com/advisories/25062
7
reference_url http://secunia.com/advisories/25445
reference_id
reference_type
scores
url http://secunia.com/advisories/25445
8
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
9
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
10
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
11
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
12
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
13
reference_url http://security.gentoo.org/glsa/glsa-200705-19.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-19.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33510
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33510
15
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067
17
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
18
reference_url http://www.debian.org/security/2007/dsa-1283
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1283
19
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
20
reference_url http://www.novell.com/linux/security/advisories/2007_32_php.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_32_php.html
21
reference_url http://www.osvdb.org/33962
reference_id
reference_type
scores
url http://www.osvdb.org/33962
22
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
23
reference_url http://www.php-security.org/MOPB/PMOPB-45-2007.html
reference_id
reference_type
scores
url http://www.php-security.org/MOPB/PMOPB-45-2007.html
24
reference_url http://www.securityfocus.com/bid/23359
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23359
25
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
26
reference_url http://www.ubuntu.com/usn/usn-455-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-455-1
27
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
28
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242034
reference_id 242034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242034
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1900
reference_id CVE-2007-1900
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1900
33
reference_url https://security.gentoo.org/glsa/200705-19
reference_id GLSA-200705-19
reference_type
scores
url https://security.gentoo.org/glsa/200705-19
34
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
35
reference_url https://usn.ubuntu.com/455-1/
reference_id USN-455-1
reference_type
scores
url https://usn.ubuntu.com/455-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.2
purl pkg:ebuild/dev-lang/php@5.2.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.2
1
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-1900
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzv8-12fu-9ba4
16
url VCID-rmzw-zrfz-qqcr
vulnerability_id VCID-rmzw-zrfz-qqcr
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4652
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38746
published_at 2026-04-01T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38879
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38901
published_at 2026-04-04T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.3883
published_at 2026-04-07T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38883
published_at 2026-04-08T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38896
published_at 2026-04-09T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38907
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.3887
published_at 2026-04-12T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38843
published_at 2026-04-13T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38888
published_at 2026-04-16T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38866
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4652
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=277971
reference_id 277971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=277971
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/10557.php
reference_id CVE-2007-4652;CVE-2006-5178;OSVDB-63305;OSVDB-36866;OSVDB-29495
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/10557.php
4
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4652
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzw-zrfz-qqcr
17
url VCID-svg5-jd8s-mbb5
vulnerability_id VCID-svg5-jd8s-mbb5
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
reference_id
reference_type
scores
0
value 0.09573
scoring_system epss
scoring_elements 0.92838
published_at 2026-04-01T12:55:00Z
1
value 0.09573
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-02T12:55:00Z
2
value 0.09573
scoring_system epss
scoring_elements 0.92849
published_at 2026-04-04T12:55:00Z
3
value 0.09573
scoring_system epss
scoring_elements 0.92847
published_at 2026-04-07T12:55:00Z
4
value 0.09573
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-08T12:55:00Z
5
value 0.09573
scoring_system epss
scoring_elements 0.92859
published_at 2026-04-09T12:55:00Z
6
value 0.09573
scoring_system epss
scoring_elements 0.92864
published_at 2026-04-13T12:55:00Z
7
value 0.09573
scoring_system epss
scoring_elements 0.92874
published_at 2026-04-16T12:55:00Z
8
value 0.09573
scoring_system epss
scoring_elements 0.92875
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278031
reference_id 278031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278031
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
reference_id 443456
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
reference_id 601525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525
6
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
7
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
8
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
9
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
10
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
11
reference_url https://usn.ubuntu.com/557-1/
reference_id USN-557-1
reference_type
scores
url https://usn.ubuntu.com/557-1/
12
reference_url https://usn.ubuntu.com/720-1/
reference_id USN-720-1
reference_type
scores
url https://usn.ubuntu.com/720-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3996
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5
18
url VCID-t6ww-kp28-dfgj
vulnerability_id VCID-t6ww-kp28-dfgj
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
4
reference_url http://osvdb.org/36083
reference_id
reference_type
scores
url http://osvdb.org/36083
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2872
reference_id
reference_type
scores
0
value 0.21049
scoring_system epss
scoring_elements 0.95658
published_at 2026-04-18T12:55:00Z
1
value 0.21049
scoring_system epss
scoring_elements 0.9561
published_at 2026-04-01T12:55:00Z
2
value 0.21049
scoring_system epss
scoring_elements 0.95618
published_at 2026-04-02T12:55:00Z
3
value 0.21049
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-04T12:55:00Z
4
value 0.21049
scoring_system epss
scoring_elements 0.95626
published_at 2026-04-07T12:55:00Z
5
value 0.21049
scoring_system epss
scoring_elements 0.95635
published_at 2026-04-08T12:55:00Z
6
value 0.21049
scoring_system epss
scoring_elements 0.95638
published_at 2026-04-09T12:55:00Z
7
value 0.21049
scoring_system epss
scoring_elements 0.95643
published_at 2026-04-12T12:55:00Z
8
value 0.21049
scoring_system epss
scoring_elements 0.95645
published_at 2026-04-13T12:55:00Z
9
value 0.21049
scoring_system epss
scoring_elements 0.95654
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2872
8
reference_url http://secunia.com/advisories/25456
reference_id
reference_type
scores
url http://secunia.com/advisories/25456
9
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
10
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
11
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
12
reference_url http://secunia.com/advisories/26838
reference_id
reference_type
scores
url http://secunia.com/advisories/26838
13
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
14
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
15
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
16
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
17
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
18
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
19
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
20
reference_url http://secunia.com/advisories/27351
reference_id
reference_type
scores
url http://secunia.com/advisories/27351
21
reference_url http://secunia.com/advisories/27377
reference_id
reference_type
scores
url http://secunia.com/advisories/27377
22
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
23
reference_url http://secunia.com/advisories/27864
reference_id
reference_type
scores
url http://secunia.com/advisories/27864
24
reference_url http://secunia.com/advisories/28318
reference_id
reference_type
scores
url http://secunia.com/advisories/28318
25
reference_url http://secunia.com/advisories/28658
reference_id
reference_type
scores
url http://secunia.com/advisories/28658
26
reference_url http://secunia.com/advisories/28750
reference_id
reference_type
scores
url http://secunia.com/advisories/28750
27
reference_url http://secunia.com/advisories/28936
reference_id
reference_type
scores
url http://secunia.com/advisories/28936
28
reference_url http://secunia.com/advisories/30040
reference_id
reference_type
scores
url http://secunia.com/advisories/30040
29
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
30
reference_url https://issues.rpath.com/browse/RPL-1693
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1693
31
reference_url https://issues.rpath.com/browse/RPL-1702
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1702
32
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
33
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
34
reference_url https://launchpad.net/bugs/173043
reference_id
reference_type
scores
url https://launchpad.net/bugs/173043
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
39
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
41
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
42
reference_url http://www.php.net/ChangeLog-4.php
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-4.php
43
reference_url http://www.php.net/releases/4_4_8.php
reference_id
reference_type
scores
url http://www.php.net/releases/4_4_8.php
44
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
45
reference_url http://www.redhat.com/support/errata/RHSA-2007-0888.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0888.html
46
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
47
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
48
reference_url http://www.sec-consult.com/291.html
reference_id
reference_type
scores
url http://www.sec-consult.com/291.html
49
reference_url http://www.securityfocus.com/archive/1/470244/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470244/100/0/threaded
50
reference_url http://www.securityfocus.com/archive/1/491693/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/491693/100/0/threaded
51
reference_url http://www.securityfocus.com/bid/24261
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24261
52
reference_url http://www.securitytracker.com/id?1018186
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018186
53
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
54
reference_url http://www.ubuntu.com/usn/usn-549-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-549-2
55
reference_url http://www.vupen.com/english/advisories/2007/2061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2061
56
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
57
reference_url http://www.vupen.com/english/advisories/2008/0059
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0059
58
reference_url http://www.vupen.com/english/advisories/2008/0398
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0398
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242032
reference_id 242032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242032
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2872
reference_id CVE-2007-2872
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2872
78
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php
reference_id CVE-2007-2872;OSVDB-36083
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php
79
reference_url https://www.securityfocus.com/bid/24261/info
reference_id CVE-2007-2872;OSVDB-36083
reference_type exploit
scores
url https://www.securityfocus.com/bid/24261/info
80
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
81
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
82
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
83
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
84
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
85
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-2872
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ww-kp28-dfgj
19
url VCID-tttf-2akk-57ez
vulnerability_id VCID-tttf-2akk-57ez
summary
Multiple vulnerabilities have been discovered in GD, allowing for the
    execution of arbitrary code.
references
0
reference_url http://bugs.libgd.org/?do=details&task_id=86
reference_id
reference_type
scores
url http://bugs.libgd.org/?do=details&task_id=86
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
3
reference_url http://osvdb.org/35788
reference_id
reference_type
scores
url http://osvdb.org/35788
4
reference_url http://osvdb.org/36643
reference_id
reference_type
scores
url http://osvdb.org/36643
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0889.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0889.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
reference_id
reference_type
scores
0
value 0.06829
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-18T12:55:00Z
1
value 0.06829
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-16T12:55:00Z
2
value 0.06829
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-12T12:55:00Z
3
value 0.06829
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-13T12:55:00Z
4
value 0.07124
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-01T12:55:00Z
5
value 0.07124
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-09T12:55:00Z
6
value 0.07124
scoring_system epss
scoring_elements 0.91542
published_at 2026-04-11T12:55:00Z
7
value 0.07124
scoring_system epss
scoring_elements 0.91532
published_at 2026-04-08T12:55:00Z
8
value 0.07124
scoring_system epss
scoring_elements 0.91505
published_at 2026-04-02T12:55:00Z
9
value 0.07124
scoring_system epss
scoring_elements 0.91511
published_at 2026-04-04T12:55:00Z
10
value 0.07124
scoring_system epss
scoring_elements 0.91519
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
9
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
10
reference_url http://secunia.com/advisories/25362
reference_id
reference_type
scores
url http://secunia.com/advisories/25362
11
reference_url http://secunia.com/advisories/25378
reference_id
reference_type
scores
url http://secunia.com/advisories/25378
12
reference_url http://secunia.com/advisories/25535
reference_id
reference_type
scores
url http://secunia.com/advisories/25535
13
reference_url http://secunia.com/advisories/25575
reference_id
reference_type
scores
url http://secunia.com/advisories/25575
14
reference_url http://secunia.com/advisories/25590
reference_id
reference_type
scores
url http://secunia.com/advisories/25590
15
reference_url http://secunia.com/advisories/25646
reference_id
reference_type
scores
url http://secunia.com/advisories/25646
16
reference_url http://secunia.com/advisories/25657
reference_id
reference_type
scores
url http://secunia.com/advisories/25657
17
reference_url http://secunia.com/advisories/25658
reference_id
reference_type
scores
url http://secunia.com/advisories/25658
18
reference_url http://secunia.com/advisories/25787
reference_id
reference_type
scores
url http://secunia.com/advisories/25787
19
reference_url http://secunia.com/advisories/25855
reference_id
reference_type
scores
url http://secunia.com/advisories/25855
20
reference_url http://secunia.com/advisories/26048
reference_id
reference_type
scores
url http://secunia.com/advisories/26048
21
reference_url http://secunia.com/advisories/26231
reference_id
reference_type
scores
url http://secunia.com/advisories/26231
22
reference_url http://secunia.com/advisories/26390
reference_id
reference_type
scores
url http://secunia.com/advisories/26390
23
reference_url http://secunia.com/advisories/26871
reference_id
reference_type
scores
url http://secunia.com/advisories/26871
24
reference_url http://secunia.com/advisories/26895
reference_id
reference_type
scores
url http://secunia.com/advisories/26895
25
reference_url http://secunia.com/advisories/26930
reference_id
reference_type
scores
url http://secunia.com/advisories/26930
26
reference_url http://secunia.com/advisories/26967
reference_id
reference_type
scores
url http://secunia.com/advisories/26967
27
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
28
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
29
reference_url http://secunia.com/advisories/27110
reference_id
reference_type
scores
url http://secunia.com/advisories/27110
30
reference_url http://secunia.com/advisories/27545
reference_id
reference_type
scores
url http://secunia.com/advisories/27545
31
reference_url http://secunia.com/advisories/29157
reference_id
reference_type
scores
url http://secunia.com/advisories/29157
32
reference_url http://secunia.com/advisories/30168
reference_id
reference_type
scores
url http://secunia.com/advisories/30168
33
reference_url http://security.gentoo.org/glsa/glsa-200708-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-05.xml
34
reference_url http://security.gentoo.org/glsa/glsa-200711-34.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-34.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200805-13.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200805-13.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
37
reference_url https://issues.rpath.com/browse/RPL-1394
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1394
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
39
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
40
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
41
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
42
reference_url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
44
reference_url http://www.libgd.org/ReleaseNote020035
reference_id
reference_type
scores
url http://www.libgd.org/ReleaseNote020035
45
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
47
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
48
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
49
reference_url http://www.novell.com/linux/security/advisories/2007_13_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_13_sr.html
50
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
51
reference_url http://www.php.net/releases/5_2_3.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_3.php
52
reference_url http://www.redhat.com/support/errata/RHSA-2007-0890.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0890.html
53
reference_url http://www.redhat.com/support/errata/RHSA-2007-0891.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0891.html
54
reference_url http://www.redhat.com/support/errata/RHSA-2008-0146.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0146.html
55
reference_url http://www.securityfocus.com/bid/24089
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24089
56
reference_url http://www.securitytracker.com/id?1018187
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018187
57
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
58
reference_url http://www.trustix.org/errata/2007/0023/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0023/
59
reference_url http://www.ubuntu.com/usn/usn-473-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-473-1
60
reference_url http://www.vupen.com/english/advisories/2007/1904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1904
61
reference_url http://www.vupen.com/english/advisories/2007/1905
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1905
62
reference_url http://www.vupen.com/english/advisories/2007/2016
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2016
63
reference_url http://www.vupen.com/english/advisories/2007/2336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2336
64
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=242033
reference_id 242033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=242033
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
reference_id 425584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584
67
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
68
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
reference_id CVE-2007-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2756
71
reference_url https://security.gentoo.org/glsa/200708-05
reference_id GLSA-200708-05
reference_type
scores
url https://security.gentoo.org/glsa/200708-05
72
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
73
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
74
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
75
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
76
reference_url https://access.redhat.com/errata/RHSA-2008:0146
reference_id RHSA-2008:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0146
77
reference_url https://usn.ubuntu.com/473-1/
reference_id USN-473-1
reference_type
scores
url https://usn.ubuntu.com/473-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-2756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez
20
url VCID-xv9u-bcbq-pqfm
vulnerability_id VCID-xv9u-bcbq-pqfm
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=307562
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307562
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
2
reference_url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3378.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3378.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3378
reference_id
reference_type
scores
0
value 0.03642
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-18T12:55:00Z
1
value 0.03642
scoring_system epss
scoring_elements 0.878
published_at 2026-04-01T12:55:00Z
2
value 0.03642
scoring_system epss
scoring_elements 0.87811
published_at 2026-04-02T12:55:00Z
3
value 0.03642
scoring_system epss
scoring_elements 0.87822
published_at 2026-04-04T12:55:00Z
4
value 0.03642
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-07T12:55:00Z
5
value 0.03642
scoring_system epss
scoring_elements 0.87847
published_at 2026-04-08T12:55:00Z
6
value 0.03642
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-09T12:55:00Z
7
value 0.03642
scoring_system epss
scoring_elements 0.87865
published_at 2026-04-11T12:55:00Z
8
value 0.03642
scoring_system epss
scoring_elements 0.87858
published_at 2026-04-12T12:55:00Z
9
value 0.03642
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-13T12:55:00Z
10
value 0.03642
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3378
5
reference_url http://seclists.org/fulldisclosure/2020/Sep/34
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2020/Sep/34
6
reference_url http://secunia.com/advisories/26642
reference_id
reference_type
scores
url http://secunia.com/advisories/26642
7
reference_url http://secunia.com/advisories/26822
reference_id
reference_type
scores
url http://secunia.com/advisories/26822
8
reference_url http://secunia.com/advisories/26838
reference_id
reference_type
scores
url http://secunia.com/advisories/26838
9
reference_url http://secunia.com/advisories/27102
reference_id
reference_type
scores
url http://secunia.com/advisories/27102
10
reference_url http://secunia.com/advisories/27377
reference_id
reference_type
scores
url http://secunia.com/advisories/27377
11
reference_url http://secunia.com/advisories/27648
reference_id
reference_type
scores
url http://secunia.com/advisories/27648
12
reference_url http://secunia.com/advisories/28318
reference_id
reference_type
scores
url http://secunia.com/advisories/28318
13
reference_url http://secunia.com/advisories/28750
reference_id
reference_type
scores
url http://secunia.com/advisories/28750
14
reference_url http://secunia.com/advisories/28936
reference_id
reference_type
scores
url http://secunia.com/advisories/28936
15
reference_url http://secunia.com/advisories/29420
reference_id
reference_type
scores
url http://secunia.com/advisories/29420
16
reference_url http://secunia.com/advisories/30040
reference_id
reference_type
scores
url http://secunia.com/advisories/30040
17
reference_url http://securityreason.com/achievement_exploitalert/9
reference_id
reference_type
scores
url http://securityreason.com/achievement_exploitalert/9
18
reference_url http://securityreason.com/achievement_securityalert/45
reference_id
reference_type
scores
url http://securityreason.com/achievement_securityalert/45
19
reference_url http://securityreason.com/securityalert/2831
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2831
20
reference_url http://securityreason.com/securityalert/3389
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3389
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
23
reference_url https://issues.rpath.com/browse/RPL-1693
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1693
24
reference_url https://issues.rpath.com/browse/RPL-1702
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1702
25
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056
27
reference_url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
28
reference_url http://www.openwall.com/lists/oss-security/2020/09/17/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/09/17/3
29
reference_url http://www.osvdb.org/38682
reference_id
reference_type
scores
url http://www.osvdb.org/38682
30
reference_url http://www.php.net/ChangeLog-4.php
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-4.php
31
reference_url http://www.php.net/ChangeLog-5.php#5.2.4
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-5.php#5.2.4
32
reference_url http://www.php.net/ChangeLog-5.php#5.2.5
reference_id
reference_type
scores
url http://www.php.net/ChangeLog-5.php#5.2.5
33
reference_url http://www.php.net/releases/4_4_8.php
reference_id
reference_type
scores
url http://www.php.net/releases/4_4_8.php
34
reference_url http://www.php.net/releases/5_2_4.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_4.php
35
reference_url http://www.php.net/releases/5_2_5.php
reference_id
reference_type
scores
url http://www.php.net/releases/5_2_5.php
36
reference_url http://www.securityfocus.com/archive/1/472343/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472343/100/0/threaded
37
reference_url http://www.securityfocus.com/archive/1/491693/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/491693/100/0/threaded
38
reference_url http://www.securityfocus.com/bid/24661
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24661
39
reference_url http://www.securityfocus.com/bid/25498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25498
40
reference_url http://www.trustix.org/errata/2007/0026/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0026/
41
reference_url http://www.vupen.com/english/advisories/2007/3023
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3023
42
reference_url http://www.vupen.com/english/advisories/2008/0059
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0059
43
reference_url http://www.vupen.com/english/advisories/2008/0398
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0398
44
reference_url http://www.vupen.com/english/advisories/2008/0924/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0924/references
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278071
reference_id 278071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278071
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3378
reference_id CVE-2007-3378
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3378
48
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3378
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv9u-bcbq-pqfm
21
url VCID-y7bg-vxmf-tuhq
vulnerability_id VCID-y7bg-vxmf-tuhq
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3806
reference_id
reference_type
scores
0
value 0.05208
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-01T12:55:00Z
1
value 0.05208
scoring_system epss
scoring_elements 0.89899
published_at 2026-04-02T12:55:00Z
2
value 0.05208
scoring_system epss
scoring_elements 0.89911
published_at 2026-04-04T12:55:00Z
3
value 0.05208
scoring_system epss
scoring_elements 0.89917
published_at 2026-04-07T12:55:00Z
4
value 0.05208
scoring_system epss
scoring_elements 0.89933
published_at 2026-04-08T12:55:00Z
5
value 0.05208
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-09T12:55:00Z
6
value 0.05208
scoring_system epss
scoring_elements 0.89947
published_at 2026-04-11T12:55:00Z
7
value 0.05208
scoring_system epss
scoring_elements 0.89945
published_at 2026-04-12T12:55:00Z
8
value 0.05208
scoring_system epss
scoring_elements 0.89938
published_at 2026-04-13T12:55:00Z
9
value 0.05208
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-16T12:55:00Z
10
value 0.05208
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3806
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278091
reference_id 278091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278091
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/4181.php
reference_id OSVDB-36085;CVE-2007-3806
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/4181.php
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3806
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7bg-vxmf-tuhq
22
url VCID-yfkz-d1tn-4fgd
vulnerability_id VCID-yfkz-d1tn-4fgd
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3997.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3997.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3997
reference_id
reference_type
scores
0
value 0.30122
scoring_system epss
scoring_elements 0.96638
published_at 2026-04-01T12:55:00Z
1
value 0.30122
scoring_system epss
scoring_elements 0.96648
published_at 2026-04-02T12:55:00Z
2
value 0.30122
scoring_system epss
scoring_elements 0.96653
published_at 2026-04-04T12:55:00Z
3
value 0.30122
scoring_system epss
scoring_elements 0.96657
published_at 2026-04-07T12:55:00Z
4
value 0.30122
scoring_system epss
scoring_elements 0.96665
published_at 2026-04-08T12:55:00Z
5
value 0.30122
scoring_system epss
scoring_elements 0.96666
published_at 2026-04-09T12:55:00Z
6
value 0.30122
scoring_system epss
scoring_elements 0.96668
published_at 2026-04-11T12:55:00Z
7
value 0.30122
scoring_system epss
scoring_elements 0.96669
published_at 2026-04-12T12:55:00Z
8
value 0.30122
scoring_system epss
scoring_elements 0.96672
published_at 2026-04-13T12:55:00Z
9
value 0.30122
scoring_system epss
scoring_elements 0.96678
published_at 2026-04-16T12:55:00Z
10
value 0.30122
scoring_system epss
scoring_elements 0.96682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3997
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278001
reference_id 278001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278001
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/4392.txt
reference_id OSVDB-36868;CVE-2007-3997;OSVDB-36867
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/4392.txt
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-3997
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfkz-d1tn-4fgd
23
url VCID-ypzg-se9g-eub8
vulnerability_id VCID-ypzg-se9g-eub8
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4784.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4784
reference_id
reference_type
scores
0
value 0.0141
scoring_system epss
scoring_elements 0.80443
published_at 2026-04-01T12:55:00Z
1
value 0.0141
scoring_system epss
scoring_elements 0.80449
published_at 2026-04-02T12:55:00Z
2
value 0.0141
scoring_system epss
scoring_elements 0.8047
published_at 2026-04-04T12:55:00Z
3
value 0.0141
scoring_system epss
scoring_elements 0.8046
published_at 2026-04-07T12:55:00Z
4
value 0.0141
scoring_system epss
scoring_elements 0.80489
published_at 2026-04-08T12:55:00Z
5
value 0.0141
scoring_system epss
scoring_elements 0.80499
published_at 2026-04-09T12:55:00Z
6
value 0.0141
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-11T12:55:00Z
7
value 0.0141
scoring_system epss
scoring_elements 0.80502
published_at 2026-04-12T12:55:00Z
8
value 0.0141
scoring_system epss
scoring_elements 0.80495
published_at 2026-04-13T12:55:00Z
9
value 0.0141
scoring_system epss
scoring_elements 0.80524
published_at 2026-04-16T12:55:00Z
10
value 0.0141
scoring_system epss
scoring_elements 0.80525
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4784
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=285901
reference_id 285901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=285901
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4784
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypzg-se9g-eub8
24
url VCID-yqzu-7yw6-3kcx
vulnerability_id VCID-yqzu-7yw6-3kcx
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4887.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4887
reference_id
reference_type
scores
0
value 0.02021
scoring_system epss
scoring_elements 0.83693
published_at 2026-04-01T12:55:00Z
1
value 0.02021
scoring_system epss
scoring_elements 0.83707
published_at 2026-04-02T12:55:00Z
2
value 0.02021
scoring_system epss
scoring_elements 0.83721
published_at 2026-04-04T12:55:00Z
3
value 0.02021
scoring_system epss
scoring_elements 0.83724
published_at 2026-04-07T12:55:00Z
4
value 0.02021
scoring_system epss
scoring_elements 0.83748
published_at 2026-04-08T12:55:00Z
5
value 0.02021
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-09T12:55:00Z
6
value 0.02021
scoring_system epss
scoring_elements 0.8377
published_at 2026-04-11T12:55:00Z
7
value 0.02021
scoring_system epss
scoring_elements 0.83764
published_at 2026-04-12T12:55:00Z
8
value 0.02021
scoring_system epss
scoring_elements 0.83759
published_at 2026-04-13T12:55:00Z
9
value 0.02021
scoring_system epss
scoring_elements 0.83793
published_at 2026-04-16T12:55:00Z
10
value 0.02021
scoring_system epss
scoring_elements 0.83794
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4887
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=290601
reference_id 290601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=290601
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4887
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqzu-7yw6-3kcx
25
url VCID-z18y-5z5q-4yff
vulnerability_id VCID-z18y-5z5q-4yff
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4670
reference_id
reference_type
scores
0
value 0.03601
scoring_system epss
scoring_elements 0.87716
published_at 2026-04-01T12:55:00Z
1
value 0.03601
scoring_system epss
scoring_elements 0.87727
published_at 2026-04-02T12:55:00Z
2
value 0.03601
scoring_system epss
scoring_elements 0.8774
published_at 2026-04-04T12:55:00Z
3
value 0.03601
scoring_system epss
scoring_elements 0.87742
published_at 2026-04-07T12:55:00Z
4
value 0.03601
scoring_system epss
scoring_elements 0.87763
published_at 2026-04-08T12:55:00Z
5
value 0.03601
scoring_system epss
scoring_elements 0.87769
published_at 2026-04-09T12:55:00Z
6
value 0.03601
scoring_system epss
scoring_elements 0.8778
published_at 2026-04-11T12:55:00Z
7
value 0.03601
scoring_system epss
scoring_elements 0.87775
published_at 2026-04-12T12:55:00Z
8
value 0.03601
scoring_system epss
scoring_elements 0.87773
published_at 2026-04-13T12:55:00Z
9
value 0.03601
scoring_system epss
scoring_elements 0.87787
published_at 2026-04-16T12:55:00Z
10
value 0.03601
scoring_system epss
scoring_elements 0.87786
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4670
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=278041
reference_id 278041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=278041
3
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
4
reference_url https://access.redhat.com/errata/RHSA-2007:0888
reference_id RHSA-2007:0888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0888
5
reference_url https://access.redhat.com/errata/RHSA-2007:0889
reference_id RHSA-2007:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0889
6
reference_url https://access.redhat.com/errata/RHSA-2007:0890
reference_id RHSA-2007:0890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0890
7
reference_url https://access.redhat.com/errata/RHSA-2007:0891
reference_id RHSA-2007:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0891
8
reference_url https://usn.ubuntu.com/549-1/
reference_id USN-549-1
reference_type
scores
url https://usn.ubuntu.com/549-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4670
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z18y-5z5q-4yff
26
url VCID-z3wv-cgxn-cyfs
vulnerability_id VCID-z3wv-cgxn-cyfs
summary
PHP contains several vulnerabilities including buffer and integer overflows
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4727
reference_id
reference_type
scores
0
value 0.18151
scoring_system epss
scoring_elements 0.9515
published_at 2026-04-01T12:55:00Z
1
value 0.18151
scoring_system epss
scoring_elements 0.95161
published_at 2026-04-02T12:55:00Z
2
value 0.18151
scoring_system epss
scoring_elements 0.95163
published_at 2026-04-04T12:55:00Z
3
value 0.18151
scoring_system epss
scoring_elements 0.95165
published_at 2026-04-07T12:55:00Z
4
value 0.18151
scoring_system epss
scoring_elements 0.95173
published_at 2026-04-08T12:55:00Z
5
value 0.18151
scoring_system epss
scoring_elements 0.95176
published_at 2026-04-09T12:55:00Z
6
value 0.18151
scoring_system epss
scoring_elements 0.95183
published_at 2026-04-12T12:55:00Z
7
value 0.18151
scoring_system epss
scoring_elements 0.95186
published_at 2026-04-13T12:55:00Z
8
value 0.18151
scoring_system epss
scoring_elements 0.95194
published_at 2026-04-16T12:55:00Z
9
value 0.18151
scoring_system epss
scoring_elements 0.95198
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4727
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441555
reference_id 441555
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441555
3
reference_url https://security.gentoo.org/glsa/200709-16
reference_id GLSA-200709-16
reference_type
scores
url https://security.gentoo.org/glsa/200709-16
4
reference_url https://security.gentoo.org/glsa/200710-02
reference_id GLSA-200710-02
reference_type
scores
url https://security.gentoo.org/glsa/200710-02
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
purl pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2
aliases CVE-2007-4727
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3wv-cgxn-cyfs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2