Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/php@5.3.15
Typeebuild
Namespacedev-lang
Namephp
Version5.3.15
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.4.5
Latest_non_vulnerable_version8.3.12
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-23zq-8g2e-b3au
vulnerability_id VCID-23zq-8g2e-b3au
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2688
reference_id
reference_type
scores
0
value 0.32676
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-01T12:55:00Z
1
value 0.32676
scoring_system epss
scoring_elements 0.96848
published_at 2026-04-02T12:55:00Z
2
value 0.32676
scoring_system epss
scoring_elements 0.96851
published_at 2026-04-04T12:55:00Z
3
value 0.32676
scoring_system epss
scoring_elements 0.96855
published_at 2026-04-07T12:55:00Z
4
value 0.32676
scoring_system epss
scoring_elements 0.96864
published_at 2026-04-08T12:55:00Z
5
value 0.32676
scoring_system epss
scoring_elements 0.96865
published_at 2026-04-09T12:55:00Z
6
value 0.32676
scoring_system epss
scoring_elements 0.96868
published_at 2026-04-11T12:55:00Z
7
value 0.32676
scoring_system epss
scoring_elements 0.96869
published_at 2026-04-12T12:55:00Z
8
value 0.32676
scoring_system epss
scoring_elements 0.9687
published_at 2026-04-13T12:55:00Z
9
value 0.32676
scoring_system epss
scoring_elements 0.96877
published_at 2026-04-16T12:55:00Z
10
value 0.32676
scoring_system epss
scoring_elements 0.96882
published_at 2026-04-18T12:55:00Z
11
value 0.32676
scoring_system epss
scoring_elements 0.96884
published_at 2026-04-21T12:55:00Z
12
value 0.32676
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2688
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=828051
reference_id 828051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=828051
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2013:0514
reference_id RHSA-2013:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0514
5
reference_url https://access.redhat.com/errata/RHSA-2013:1307
reference_id RHSA-2013:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1307
6
reference_url https://access.redhat.com/errata/RHSA-2013:1814
reference_id RHSA-2013:1814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1814
7
reference_url https://usn.ubuntu.com/1569-1/
reference_id USN-1569-1
reference_type
scores
url https://usn.ubuntu.com/1569-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2688
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23zq-8g2e-b3au
1
url VCID-2pjr-p6ge-nfa9
vulnerability_id VCID-2pjr-p6ge-nfa9
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1172
reference_id
reference_type
scores
0
value 0.1185
scoring_system epss
scoring_elements 0.93688
published_at 2026-04-01T12:55:00Z
1
value 0.1185
scoring_system epss
scoring_elements 0.93698
published_at 2026-04-02T12:55:00Z
2
value 0.1185
scoring_system epss
scoring_elements 0.93708
published_at 2026-04-04T12:55:00Z
3
value 0.1185
scoring_system epss
scoring_elements 0.93711
published_at 2026-04-07T12:55:00Z
4
value 0.1185
scoring_system epss
scoring_elements 0.9372
published_at 2026-04-08T12:55:00Z
5
value 0.1185
scoring_system epss
scoring_elements 0.93722
published_at 2026-04-09T12:55:00Z
6
value 0.1185
scoring_system epss
scoring_elements 0.93726
published_at 2026-04-12T12:55:00Z
7
value 0.1185
scoring_system epss
scoring_elements 0.93727
published_at 2026-04-13T12:55:00Z
8
value 0.1185
scoring_system epss
scoring_elements 0.93744
published_at 2026-04-16T12:55:00Z
9
value 0.1185
scoring_system epss
scoring_elements 0.93751
published_at 2026-04-18T12:55:00Z
10
value 0.1185
scoring_system epss
scoring_elements 0.93754
published_at 2026-04-21T12:55:00Z
11
value 0.1185
scoring_system epss
scoring_elements 0.93758
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1172
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=799187
reference_id 799187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=799187
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2012:1045
reference_id RHSA-2012:1045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1045
5
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
6
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
7
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-1172
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pjr-p6ge-nfa9
2
url VCID-35a3-5eq3-8bep
vulnerability_id VCID-35a3-5eq3-8bep
summary Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2143
reference_id
reference_type
scores
0
value 0.02995
scoring_system epss
scoring_elements 0.86493
published_at 2026-04-01T12:55:00Z
1
value 0.02995
scoring_system epss
scoring_elements 0.86503
published_at 2026-04-02T12:55:00Z
2
value 0.02995
scoring_system epss
scoring_elements 0.86522
published_at 2026-04-04T12:55:00Z
3
value 0.02995
scoring_system epss
scoring_elements 0.86521
published_at 2026-04-07T12:55:00Z
4
value 0.02995
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-08T12:55:00Z
5
value 0.02995
scoring_system epss
scoring_elements 0.8655
published_at 2026-04-09T12:55:00Z
6
value 0.02995
scoring_system epss
scoring_elements 0.86565
published_at 2026-04-11T12:55:00Z
7
value 0.02995
scoring_system epss
scoring_elements 0.86562
published_at 2026-04-12T12:55:00Z
8
value 0.02995
scoring_system epss
scoring_elements 0.86555
published_at 2026-04-13T12:55:00Z
9
value 0.02995
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-16T12:55:00Z
10
value 0.02995
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-18T12:55:00Z
11
value 0.02995
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-21T12:55:00Z
12
value 0.02995
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2143
2
reference_url https://www.postgresql.org/support/security/CVE-2012-2143/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-2143/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816956
reference_id 816956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=816956
4
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
5
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
6
reference_url https://access.redhat.com/errata/RHSA-2012:1036
reference_id RHSA-2012:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1036
7
reference_url https://access.redhat.com/errata/RHSA-2012:1037
reference_id RHSA-2012:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1037
8
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
9
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
10
reference_url https://usn.ubuntu.com/1461-1/
reference_id USN-1461-1
reference_type
scores
url https://usn.ubuntu.com/1461-1/
11
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2143
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep
3
url VCID-3zy4-mx5a-yqbs
vulnerability_id VCID-3zy4-mx5a-yqbs
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0057
reference_id
reference_type
scores
0
value 0.0159
scoring_system epss
scoring_elements 0.81571
published_at 2026-04-01T12:55:00Z
1
value 0.0159
scoring_system epss
scoring_elements 0.81582
published_at 2026-04-02T12:55:00Z
2
value 0.0159
scoring_system epss
scoring_elements 0.81603
published_at 2026-04-04T12:55:00Z
3
value 0.0159
scoring_system epss
scoring_elements 0.81601
published_at 2026-04-07T12:55:00Z
4
value 0.0159
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-08T12:55:00Z
5
value 0.0159
scoring_system epss
scoring_elements 0.81633
published_at 2026-04-09T12:55:00Z
6
value 0.0159
scoring_system epss
scoring_elements 0.81654
published_at 2026-04-11T12:55:00Z
7
value 0.0159
scoring_system epss
scoring_elements 0.8164
published_at 2026-04-12T12:55:00Z
8
value 0.0159
scoring_system epss
scoring_elements 0.81634
published_at 2026-04-13T12:55:00Z
9
value 0.0159
scoring_system epss
scoring_elements 0.81672
published_at 2026-04-18T12:55:00Z
10
value 0.0159
scoring_system epss
scoring_elements 0.81676
published_at 2026-04-21T12:55:00Z
11
value 0.0159
scoring_system epss
scoring_elements 0.81699
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0057
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=782657
reference_id 782657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=782657
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2012:1045
reference_id RHSA-2012:1045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1045
5
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
6
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
7
reference_url https://usn.ubuntu.com/1358-1/
reference_id USN-1358-1
reference_type
scores
url https://usn.ubuntu.com/1358-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-0057
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zy4-mx5a-yqbs
4
url VCID-53gf-rv7v-d3f3
vulnerability_id VCID-53gf-rv7v-d3f3
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3379
reference_id
reference_type
scores
0
value 0.01085
scoring_system epss
scoring_elements 0.77824
published_at 2026-04-01T12:55:00Z
1
value 0.01085
scoring_system epss
scoring_elements 0.7783
published_at 2026-04-02T12:55:00Z
2
value 0.01085
scoring_system epss
scoring_elements 0.77858
published_at 2026-04-04T12:55:00Z
3
value 0.01085
scoring_system epss
scoring_elements 0.7784
published_at 2026-04-07T12:55:00Z
4
value 0.01085
scoring_system epss
scoring_elements 0.77867
published_at 2026-04-08T12:55:00Z
5
value 0.01085
scoring_system epss
scoring_elements 0.77872
published_at 2026-04-09T12:55:00Z
6
value 0.01085
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-11T12:55:00Z
7
value 0.01085
scoring_system epss
scoring_elements 0.77883
published_at 2026-04-12T12:55:00Z
8
value 0.01085
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-13T12:55:00Z
9
value 0.01085
scoring_system epss
scoring_elements 0.77919
published_at 2026-04-16T12:55:00Z
10
value 0.01085
scoring_system epss
scoring_elements 0.77918
published_at 2026-04-18T12:55:00Z
11
value 0.01085
scoring_system epss
scoring_elements 0.77912
published_at 2026-04-21T12:55:00Z
12
value 0.01085
scoring_system epss
scoring_elements 0.77946
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3379
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=741020
reference_id 741020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=741020
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2011-3379
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53gf-rv7v-d3f3
5
url VCID-5cwv-tp4y-3yb3
vulnerability_id VCID-5cwv-tp4y-3yb3
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0830
reference_id
reference_type
scores
0
value 0.26594
scoring_system epss
scoring_elements 0.96295
published_at 2026-04-01T12:55:00Z
1
value 0.26594
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-02T12:55:00Z
2
value 0.26594
scoring_system epss
scoring_elements 0.96311
published_at 2026-04-04T12:55:00Z
3
value 0.26594
scoring_system epss
scoring_elements 0.96315
published_at 2026-04-07T12:55:00Z
4
value 0.26594
scoring_system epss
scoring_elements 0.96323
published_at 2026-04-08T12:55:00Z
5
value 0.26594
scoring_system epss
scoring_elements 0.96326
published_at 2026-04-09T12:55:00Z
6
value 0.26594
scoring_system epss
scoring_elements 0.9633
published_at 2026-04-12T12:55:00Z
7
value 0.26594
scoring_system epss
scoring_elements 0.96333
published_at 2026-04-13T12:55:00Z
8
value 0.26594
scoring_system epss
scoring_elements 0.96342
published_at 2026-04-16T12:55:00Z
9
value 0.26594
scoring_system epss
scoring_elements 0.96346
published_at 2026-04-18T12:55:00Z
10
value 0.26594
scoring_system epss
scoring_elements 0.96347
published_at 2026-04-21T12:55:00Z
11
value 0.26594
scoring_system epss
scoring_elements 0.96348
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0830
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786686
reference_id 786686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786686
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php
reference_id OSVDB-78819;CVE-2012-0830
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php
5
reference_url https://access.redhat.com/errata/RHSA-2012:0092
reference_id RHSA-2012:0092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0092
6
reference_url https://access.redhat.com/errata/RHSA-2012:0093
reference_id RHSA-2012:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0093
7
reference_url https://usn.ubuntu.com/1358-1/
reference_id USN-1358-1
reference_type
scores
url https://usn.ubuntu.com/1358-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-0830
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwv-tp4y-3yb3
6
url VCID-6vuh-9zaj-u3dr
vulnerability_id VCID-6vuh-9zaj-u3dr
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url http://article.gmane.org/gmane.comp.php.devel/70584
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.php.devel/70584
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
2
reference_url http://openwall.com/lists/oss-security/2012/08/29/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/08/29/5
3
reference_url http://openwall.com/lists/oss-security/2012/09/05/15
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/09/05/15
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1307.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1307.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1398
reference_id
reference_type
scores
0
value 0.08906
scoring_system epss
scoring_elements 0.92588
published_at 2026-04-24T12:55:00Z
1
value 0.08906
scoring_system epss
scoring_elements 0.92536
published_at 2026-04-01T12:55:00Z
2
value 0.08906
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-02T12:55:00Z
3
value 0.08906
scoring_system epss
scoring_elements 0.92548
published_at 2026-04-04T12:55:00Z
4
value 0.08906
scoring_system epss
scoring_elements 0.92551
published_at 2026-04-07T12:55:00Z
5
value 0.08906
scoring_system epss
scoring_elements 0.92562
published_at 2026-04-08T12:55:00Z
6
value 0.08906
scoring_system epss
scoring_elements 0.92566
published_at 2026-04-09T12:55:00Z
7
value 0.08906
scoring_system epss
scoring_elements 0.92573
published_at 2026-04-12T12:55:00Z
8
value 0.08906
scoring_system epss
scoring_elements 0.92572
published_at 2026-04-13T12:55:00Z
9
value 0.08906
scoring_system epss
scoring_elements 0.92584
published_at 2026-04-16T12:55:00Z
10
value 0.08906
scoring_system epss
scoring_elements 0.92583
published_at 2026-04-18T12:55:00Z
11
value 0.08906
scoring_system epss
scoring_elements 0.92586
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1398
7
reference_url https://bugs.php.net/bug.php?id=60227
reference_id
reference_type
scores
url https://bugs.php.net/bug.php?id=60227
8
reference_url http://secunia.com/advisories/55078
reference_id
reference_type
scores
url http://secunia.com/advisories/55078
9
reference_url http://security-tracker.debian.org/tracker/CVE-2011-1398
reference_id
reference_type
scores
url http://security-tracker.debian.org/tracker/CVE-2011-1398
10
reference_url http://www.securitytracker.com/id?1027463
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027463
11
reference_url http://www.ubuntu.com/usn/USN-1569-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1569-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=853329
reference_id 853329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=853329
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1398
reference_id CVE-2011-1398
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1398
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt
reference_id CVE-2011-1398;OSVDB-85086
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt
26
reference_url https://www.securityfocus.com/bid/55297/info
reference_id CVE-2011-1398;OSVDB-85086
reference_type exploit
scores
url https://www.securityfocus.com/bid/55297/info
27
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
28
reference_url https://access.redhat.com/errata/RHSA-2013:0514
reference_id RHSA-2013:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0514
29
reference_url https://access.redhat.com/errata/RHSA-2013:1307
reference_id RHSA-2013:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1307
30
reference_url https://access.redhat.com/errata/RHSA-2013:1814
reference_id RHSA-2013:1814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1814
31
reference_url https://usn.ubuntu.com/1569-1/
reference_id USN-1569-1
reference_type
scores
url https://usn.ubuntu.com/1569-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2011-1398
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vuh-9zaj-u3dr
7
url VCID-9seb-bqzd-7kgz
vulnerability_id VCID-9seb-bqzd-7kgz
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3365
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75865
published_at 2026-04-02T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75897
published_at 2026-04-04T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-07T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75909
published_at 2026-04-08T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75923
published_at 2026-04-09T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75946
published_at 2026-04-11T12:55:00Z
7
value 0.00917
scoring_system epss
scoring_elements 0.75924
published_at 2026-04-12T12:55:00Z
8
value 0.00917
scoring_system epss
scoring_elements 0.75917
published_at 2026-04-13T12:55:00Z
9
value 0.00917
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-16T12:55:00Z
10
value 0.00917
scoring_system epss
scoring_elements 0.75957
published_at 2026-04-18T12:55:00Z
11
value 0.00917
scoring_system epss
scoring_elements 0.75942
published_at 2026-04-21T12:55:00Z
12
value 0.00917
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3365
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841972
reference_id 841972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841972
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-3365
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9seb-bqzd-7kgz
8
url VCID-age2-x97h-m3bk
vulnerability_id VCID-age2-x97h-m3bk
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4885
reference_id
reference_type
scores
0
value 0.86573
scoring_system epss
scoring_elements 0.99411
published_at 2026-04-02T12:55:00Z
1
value 0.86573
scoring_system epss
scoring_elements 0.99413
published_at 2026-04-07T12:55:00Z
2
value 0.86573
scoring_system epss
scoring_elements 0.99414
published_at 2026-04-08T12:55:00Z
3
value 0.86573
scoring_system epss
scoring_elements 0.99415
published_at 2026-04-09T12:55:00Z
4
value 0.86573
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-11T12:55:00Z
5
value 0.86573
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-12T12:55:00Z
6
value 0.86573
scoring_system epss
scoring_elements 0.99418
published_at 2026-04-13T12:55:00Z
7
value 0.86573
scoring_system epss
scoring_elements 0.99421
published_at 2026-04-16T12:55:00Z
8
value 0.86573
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-21T12:55:00Z
9
value 0.86573
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4885
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=750547
reference_id 750547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=750547
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt
reference_id CVE-2011-4885;OSVDB-78115
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py
reference_id CVE-2011-4885;OSVDB-78115
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py
5
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
6
reference_url https://access.redhat.com/errata/RHSA-2012:0019
reference_id RHSA-2012:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0019
7
reference_url https://access.redhat.com/errata/RHSA-2012:0033
reference_id RHSA-2012:0033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0033
8
reference_url https://access.redhat.com/errata/RHSA-2012:0071
reference_id RHSA-2012:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0071
9
reference_url https://usn.ubuntu.com/1358-1/
reference_id USN-1358-1
reference_type
scores
url https://usn.ubuntu.com/1358-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2011-4885
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-age2-x97h-m3bk
9
url VCID-c7yt-uufn-6kgn
vulnerability_id VCID-c7yt-uufn-6kgn
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0831
reference_id
reference_type
scores
0
value 0.10633
scoring_system epss
scoring_elements 0.93268
published_at 2026-04-01T12:55:00Z
1
value 0.10633
scoring_system epss
scoring_elements 0.93276
published_at 2026-04-02T12:55:00Z
2
value 0.10633
scoring_system epss
scoring_elements 0.93282
published_at 2026-04-04T12:55:00Z
3
value 0.10633
scoring_system epss
scoring_elements 0.93281
published_at 2026-04-07T12:55:00Z
4
value 0.10633
scoring_system epss
scoring_elements 0.9329
published_at 2026-04-08T12:55:00Z
5
value 0.10633
scoring_system epss
scoring_elements 0.93294
published_at 2026-04-09T12:55:00Z
6
value 0.10633
scoring_system epss
scoring_elements 0.93298
published_at 2026-04-13T12:55:00Z
7
value 0.10633
scoring_system epss
scoring_elements 0.93296
published_at 2026-04-12T12:55:00Z
8
value 0.10633
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-16T12:55:00Z
9
value 0.10633
scoring_system epss
scoring_elements 0.93321
published_at 2026-04-18T12:55:00Z
10
value 0.10633
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-21T12:55:00Z
11
value 0.10633
scoring_system epss
scoring_elements 0.93332
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0831
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=789468
reference_id 789468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=789468
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2013:0514
reference_id RHSA-2013:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0514
5
reference_url https://access.redhat.com/errata/RHSA-2013:1307
reference_id RHSA-2013:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1307
6
reference_url https://usn.ubuntu.com/1358-1/
reference_id USN-1358-1
reference_type
scores
url https://usn.ubuntu.com/1358-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-0831
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c7yt-uufn-6kgn
10
url VCID-e9tp-55er-6khz
vulnerability_id VCID-e9tp-55er-6khz
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2311
reference_id
reference_type
scores
0
value 0.74532
scoring_system epss
scoring_elements 0.98864
published_at 2026-04-24T12:55:00Z
1
value 0.74532
scoring_system epss
scoring_elements 0.98842
published_at 2026-04-02T12:55:00Z
2
value 0.74532
scoring_system epss
scoring_elements 0.98844
published_at 2026-04-04T12:55:00Z
3
value 0.74532
scoring_system epss
scoring_elements 0.98845
published_at 2026-04-07T12:55:00Z
4
value 0.74532
scoring_system epss
scoring_elements 0.98847
published_at 2026-04-08T12:55:00Z
5
value 0.74532
scoring_system epss
scoring_elements 0.98846
published_at 2026-04-09T12:55:00Z
6
value 0.74532
scoring_system epss
scoring_elements 0.98849
published_at 2026-04-11T12:55:00Z
7
value 0.74532
scoring_system epss
scoring_elements 0.9885
published_at 2026-04-13T12:55:00Z
8
value 0.74532
scoring_system epss
scoring_elements 0.98854
published_at 2026-04-16T12:55:00Z
9
value 0.74532
scoring_system epss
scoring_elements 0.98855
published_at 2026-04-18T12:55:00Z
10
value 0.74532
scoring_system epss
scoring_elements 0.98859
published_at 2026-04-21T12:55:00Z
11
value 0.83245
scoring_system epss
scoring_elements 0.99259
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2311
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818907
reference_id 818907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818907
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://usn.ubuntu.com/1437-1/
reference_id USN-1437-1
reference_type
scores
url https://usn.ubuntu.com/1437-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2311
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9tp-55er-6khz
11
url VCID-gxpt-kwgy-zbap
vulnerability_id VCID-gxpt-kwgy-zbap
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0788
reference_id
reference_type
scores
0
value 0.05214
scoring_system epss
scoring_elements 0.89899
published_at 2026-04-01T12:55:00Z
1
value 0.05214
scoring_system epss
scoring_elements 0.89902
published_at 2026-04-02T12:55:00Z
2
value 0.05214
scoring_system epss
scoring_elements 0.89915
published_at 2026-04-04T12:55:00Z
3
value 0.05214
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-07T12:55:00Z
4
value 0.05214
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-08T12:55:00Z
5
value 0.05214
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-09T12:55:00Z
6
value 0.05214
scoring_system epss
scoring_elements 0.89951
published_at 2026-04-11T12:55:00Z
7
value 0.05214
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-12T12:55:00Z
8
value 0.05214
scoring_system epss
scoring_elements 0.89942
published_at 2026-04-13T12:55:00Z
9
value 0.05214
scoring_system epss
scoring_elements 0.89956
published_at 2026-04-16T12:55:00Z
10
value 0.05214
scoring_system epss
scoring_elements 0.89957
published_at 2026-04-18T12:55:00Z
11
value 0.05214
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-21T12:55:00Z
12
value 0.05214
scoring_system epss
scoring_elements 0.89969
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0788
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=783605
reference_id 783605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=783605
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php
reference_id CVE-2012-0788;OSVDB-79016
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php
4
reference_url https://www.securityfocus.com/bid/51952/info
reference_id CVE-2012-0788;OSVDB-79016
reference_type exploit
scores
url https://www.securityfocus.com/bid/51952/info
5
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
6
reference_url https://usn.ubuntu.com/1358-1/
reference_id USN-1358-1
reference_type
scores
url https://usn.ubuntu.com/1358-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-0788
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxpt-kwgy-zbap
12
url VCID-hzpu-97n9-jqaa
vulnerability_id VCID-hzpu-97n9-jqaa
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2386
reference_id
reference_type
scores
0
value 0.28352
scoring_system epss
scoring_elements 0.96478
published_at 2026-04-01T12:55:00Z
1
value 0.28352
scoring_system epss
scoring_elements 0.96487
published_at 2026-04-02T12:55:00Z
2
value 0.28352
scoring_system epss
scoring_elements 0.96491
published_at 2026-04-04T12:55:00Z
3
value 0.28352
scoring_system epss
scoring_elements 0.96495
published_at 2026-04-07T12:55:00Z
4
value 0.28352
scoring_system epss
scoring_elements 0.96503
published_at 2026-04-08T12:55:00Z
5
value 0.28352
scoring_system epss
scoring_elements 0.96506
published_at 2026-04-09T12:55:00Z
6
value 0.28352
scoring_system epss
scoring_elements 0.96509
published_at 2026-04-12T12:55:00Z
7
value 0.28352
scoring_system epss
scoring_elements 0.96512
published_at 2026-04-13T12:55:00Z
8
value 0.28352
scoring_system epss
scoring_elements 0.96518
published_at 2026-04-16T12:55:00Z
9
value 0.28352
scoring_system epss
scoring_elements 0.96524
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2386
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=823594
reference_id 823594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=823594
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php
reference_id OSVDB-72399;CVE-2012-2386
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php
5
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
6
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
7
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2386
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzpu-97n9-jqaa
13
url VCID-jd52-h8fq-5fem
vulnerability_id VCID-jd52-h8fq-5fem
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2335
reference_id
reference_type
scores
0
value 0.1652
scoring_system epss
scoring_elements 0.94871
published_at 2026-04-01T12:55:00Z
1
value 0.1652
scoring_system epss
scoring_elements 0.9488
published_at 2026-04-02T12:55:00Z
2
value 0.1652
scoring_system epss
scoring_elements 0.94883
published_at 2026-04-04T12:55:00Z
3
value 0.1652
scoring_system epss
scoring_elements 0.94885
published_at 2026-04-07T12:55:00Z
4
value 0.1652
scoring_system epss
scoring_elements 0.94894
published_at 2026-04-08T12:55:00Z
5
value 0.1652
scoring_system epss
scoring_elements 0.94898
published_at 2026-04-09T12:55:00Z
6
value 0.1652
scoring_system epss
scoring_elements 0.94903
published_at 2026-04-11T12:55:00Z
7
value 0.1652
scoring_system epss
scoring_elements 0.94905
published_at 2026-04-12T12:55:00Z
8
value 0.1652
scoring_system epss
scoring_elements 0.94907
published_at 2026-04-13T12:55:00Z
9
value 0.1652
scoring_system epss
scoring_elements 0.94914
published_at 2026-04-16T12:55:00Z
10
value 0.1652
scoring_system epss
scoring_elements 0.94917
published_at 2026-04-18T12:55:00Z
11
value 0.1652
scoring_system epss
scoring_elements 0.94921
published_at 2026-04-21T12:55:00Z
12
value 0.1652
scoring_system epss
scoring_elements 0.94922
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2335
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=820874
reference_id 820874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=820874
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2335
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jd52-h8fq-5fem
14
url VCID-myft-jnpz-r7gb
vulnerability_id VCID-myft-jnpz-r7gb
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1823
reference_id
reference_type
scores
0
value 0.94363
scoring_system epss
scoring_elements 0.99965
published_at 2026-04-24T12:55:00Z
1
value 0.94386
scoring_system epss
scoring_elements 0.99971
published_at 2026-04-18T12:55:00Z
2
value 0.94386
scoring_system epss
scoring_elements 0.99972
published_at 2026-04-08T12:55:00Z
3
value 0.94386
scoring_system epss
scoring_elements 0.9997
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1823
2
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
3
reference_url http://www.php.net/archive/2012.php#id2012-05-03-1
reference_id 2012.php#id2012-05-03-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.php.net/archive/2012.php#id2012-05-03-1
4
reference_url http://secunia.com/advisories/49014
reference_id 49014
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://secunia.com/advisories/49014
5
reference_url http://secunia.com/advisories/49065
reference_id 49065
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://secunia.com/advisories/49065
6
reference_url http://secunia.com/advisories/49085
reference_id 49085
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://secunia.com/advisories/49085
7
reference_url http://secunia.com/advisories/49087
reference_id 49087
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://secunia.com/advisories/49087
8
reference_url http://www.kb.cert.org/vuls/id/520827
reference_id 520827
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.kb.cert.org/vuls/id/520827
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818607
reference_id 818607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818607
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:068
reference_id advisories?name=MDVSA-2012:068
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:068
11
reference_url https://bugs.php.net/bug.php?id=61910
reference_id bug.php?id=61910
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url https://bugs.php.net/bug.php?id=61910
12
reference_url http://www.php.net/ChangeLog-5.php#5.4.2
reference_id ChangeLog-5.php#5.4.2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.php.net/ChangeLog-5.php#5.4.2
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py
reference_id CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c
reference_id CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py
reference_id CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py
16
reference_url http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
reference_id CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823
reference_type exploit
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
17
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb
reference_id CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb
18
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
reference_id Document.jsp?objectID=c03360041
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
19
reference_url http://www.debian.org/security/2012/dsa-2465
reference_id dsa-2465
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.debian.org/security/2012/dsa-2465
20
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
21
reference_url http://www.securitytracker.com/id?1027022
reference_id id?1027022
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://www.securitytracker.com/id?1027022
22
reference_url http://marc.info/?l=bugtraq&m=134012830914727&w=2
reference_id ?l=bugtraq&m=134012830914727&w=2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://marc.info/?l=bugtraq&m=134012830914727&w=2
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html
26
reference_url https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1
reference_id patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
28
reference_url https://access.redhat.com/errata/RHSA-2012:0546
reference_id RHSA-2012:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0546
29
reference_url http://rhn.redhat.com/errata/RHSA-2012-0546.html
reference_id RHSA-2012-0546.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://rhn.redhat.com/errata/RHSA-2012-0546.html
30
reference_url https://access.redhat.com/errata/RHSA-2012:0547
reference_id RHSA-2012:0547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0547
31
reference_url http://rhn.redhat.com/errata/RHSA-2012-0547.html
reference_id RHSA-2012-0547.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://rhn.redhat.com/errata/RHSA-2012-0547.html
32
reference_url https://access.redhat.com/errata/RHSA-2012:0568
reference_id RHSA-2012:0568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0568
33
reference_url http://rhn.redhat.com/errata/RHSA-2012-0568.html
reference_id RHSA-2012-0568.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://rhn.redhat.com/errata/RHSA-2012-0568.html
34
reference_url https://access.redhat.com/errata/RHSA-2012:0569
reference_id RHSA-2012:0569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0569
35
reference_url http://rhn.redhat.com/errata/RHSA-2012-0569.html
reference_id RHSA-2012-0569.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://rhn.redhat.com/errata/RHSA-2012-0569.html
36
reference_url http://rhn.redhat.com/errata/RHSA-2012-0570.html
reference_id RHSA-2012-0570.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url http://rhn.redhat.com/errata/RHSA-2012-0570.html
37
reference_url https://usn.ubuntu.com/1437-1/
reference_id USN-1437-1
reference_type
scores
url https://usn.ubuntu.com/1437-1/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-1823
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-myft-jnpz-r7gb
15
url VCID-quge-cbz3-p7h2
vulnerability_id VCID-quge-cbz3-p7h2
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3450
reference_id
reference_type
scores
0
value 0.12009
scoring_system epss
scoring_elements 0.93737
published_at 2026-04-01T12:55:00Z
1
value 0.12009
scoring_system epss
scoring_elements 0.93747
published_at 2026-04-02T12:55:00Z
2
value 0.12009
scoring_system epss
scoring_elements 0.93757
published_at 2026-04-04T12:55:00Z
3
value 0.12383
scoring_system epss
scoring_elements 0.93872
published_at 2026-04-07T12:55:00Z
4
value 0.12383
scoring_system epss
scoring_elements 0.93881
published_at 2026-04-08T12:55:00Z
5
value 0.12383
scoring_system epss
scoring_elements 0.93884
published_at 2026-04-09T12:55:00Z
6
value 0.12383
scoring_system epss
scoring_elements 0.93889
published_at 2026-04-13T12:55:00Z
7
value 0.12383
scoring_system epss
scoring_elements 0.93911
published_at 2026-04-16T12:55:00Z
8
value 0.12383
scoring_system epss
scoring_elements 0.93916
published_at 2026-04-18T12:55:00Z
9
value 0.12383
scoring_system epss
scoring_elements 0.93917
published_at 2026-04-21T12:55:00Z
10
value 0.12383
scoring_system epss
scoring_elements 0.93919
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3450
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=845372
reference_id 845372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=845372
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php
reference_id CVE-2012-3450;OSVDB-82931
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php
4
reference_url https://www.securityfocus.com/bid/54777/info
reference_id CVE-2012-3450;OSVDB-82931
reference_type exploit
scores
url https://www.securityfocus.com/bid/54777/info
5
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
6
reference_url https://usn.ubuntu.com/1569-1/
reference_id USN-1569-1
reference_type
scores
url https://usn.ubuntu.com/1569-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-3450
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-quge-cbz3-p7h2
16
url VCID-vjm8-c1u4-wfab
vulnerability_id VCID-vjm8-c1u4-wfab
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2336
reference_id
reference_type
scores
0
value 0.47326
scoring_system epss
scoring_elements 0.97701
published_at 2026-04-24T12:55:00Z
1
value 0.47326
scoring_system epss
scoring_elements 0.97678
published_at 2026-04-02T12:55:00Z
2
value 0.47326
scoring_system epss
scoring_elements 0.97679
published_at 2026-04-07T12:55:00Z
3
value 0.47326
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-08T12:55:00Z
4
value 0.47326
scoring_system epss
scoring_elements 0.97687
published_at 2026-04-09T12:55:00Z
5
value 0.47326
scoring_system epss
scoring_elements 0.97689
published_at 2026-04-11T12:55:00Z
6
value 0.47326
scoring_system epss
scoring_elements 0.97691
published_at 2026-04-12T12:55:00Z
7
value 0.47326
scoring_system epss
scoring_elements 0.97693
published_at 2026-04-13T12:55:00Z
8
value 0.47326
scoring_system epss
scoring_elements 0.97699
published_at 2026-04-16T12:55:00Z
9
value 0.5291
scoring_system epss
scoring_elements 0.97931
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2336
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=820708
reference_id 820708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=820708
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2012:1045
reference_id RHSA-2012:1045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1045
5
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
6
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
7
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-2336
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjm8-c1u4-wfab
17
url VCID-ytg7-b7vh-1ubw
vulnerability_id VCID-ytg7-b7vh-1ubw
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4566
reference_id
reference_type
scores
0
value 0.37102
scoring_system epss
scoring_elements 0.97132
published_at 2026-04-01T12:55:00Z
1
value 0.37102
scoring_system epss
scoring_elements 0.97139
published_at 2026-04-02T12:55:00Z
2
value 0.37102
scoring_system epss
scoring_elements 0.97145
published_at 2026-04-07T12:55:00Z
3
value 0.37102
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-09T12:55:00Z
4
value 0.37102
scoring_system epss
scoring_elements 0.9716
published_at 2026-04-11T12:55:00Z
5
value 0.37102
scoring_system epss
scoring_elements 0.97161
published_at 2026-04-12T12:55:00Z
6
value 0.37102
scoring_system epss
scoring_elements 0.97162
published_at 2026-04-13T12:55:00Z
7
value 0.37102
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-16T12:55:00Z
8
value 0.37102
scoring_system epss
scoring_elements 0.97171
published_at 2026-04-18T12:55:00Z
9
value 0.37102
scoring_system epss
scoring_elements 0.97175
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4566
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=758413
reference_id 758413
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=758413
3
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
4
reference_url https://access.redhat.com/errata/RHSA-2012:0019
reference_id RHSA-2012:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0019
5
reference_url https://access.redhat.com/errata/RHSA-2012:0033
reference_id RHSA-2012:0033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0033
6
reference_url https://access.redhat.com/errata/RHSA-2012:0071
reference_id RHSA-2012:0071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0071
7
reference_url https://usn.ubuntu.com/1307-1/
reference_id USN-1307-1
reference_type
scores
url https://usn.ubuntu.com/1307-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2011-4566
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytg7-b7vh-1ubw
18
url VCID-zquc-69kh-yqdg
vulnerability_id VCID-zquc-69kh-yqdg
summary
Multiple vulnerabilities were found in PHP, the worst of which lead
    to remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0789
reference_id
reference_type
scores
0
value 0.0779
scoring_system epss
scoring_elements 0.91929
published_at 2026-04-01T12:55:00Z
1
value 0.0779
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-02T12:55:00Z
2
value 0.0779
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-04T12:55:00Z
3
value 0.0779
scoring_system epss
scoring_elements 0.91951
published_at 2026-04-07T12:55:00Z
4
value 0.0779
scoring_system epss
scoring_elements 0.91964
published_at 2026-04-08T12:55:00Z
5
value 0.0779
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-09T12:55:00Z
6
value 0.0779
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-11T12:55:00Z
7
value 0.0779
scoring_system epss
scoring_elements 0.91971
published_at 2026-04-12T12:55:00Z
8
value 0.0779
scoring_system epss
scoring_elements 0.91968
published_at 2026-04-13T12:55:00Z
9
value 0.0779
scoring_system epss
scoring_elements 0.91987
published_at 2026-04-16T12:55:00Z
10
value 0.0779
scoring_system epss
scoring_elements 0.91984
published_at 2026-04-18T12:55:00Z
11
value 0.0779
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-21T12:55:00Z
12
value 0.0779
scoring_system epss
scoring_elements 0.91985
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0789
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=783609
reference_id 783609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=783609
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php
reference_id CVE-2012-0789;OSVDB-79332
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php
4
reference_url https://www.securityfocus.com/bid/52043/info
reference_id CVE-2012-0789;OSVDB-79332
reference_type exploit
scores
url https://www.securityfocus.com/bid/52043/info
5
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
6
reference_url https://access.redhat.com/errata/RHSA-2012:1045
reference_id RHSA-2012:1045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1045
7
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
8
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
fixed_packages
0
url pkg:ebuild/dev-lang/php@5.3.15
purl pkg:ebuild/dev-lang/php@5.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15
1
url pkg:ebuild/dev-lang/php@5.4.5
purl pkg:ebuild/dev-lang/php@5.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5
aliases CVE-2012-0789
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zquc-69kh-yqdg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15