Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/php@5.1.4
Typeebuild
Namespacedev-lang
Namephp
Version5.1.4
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.1.4-r4
Latest_non_vulnerable_version8.3.12
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6f19-e981-kybs
vulnerability_id VCID-6f19-e981-kybs
summary
PHP is affected by multiple issues, including a buffer overflow in
    wordwrap() which may lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0996.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0996
reference_id
reference_type
scores
0
value 0.18154
scoring_system epss
scoring_elements 0.95151
published_at 2026-04-01T12:55:00Z
1
value 0.18154
scoring_system epss
scoring_elements 0.95162
published_at 2026-04-02T12:55:00Z
2
value 0.18154
scoring_system epss
scoring_elements 0.95164
published_at 2026-04-04T12:55:00Z
3
value 0.18154
scoring_system epss
scoring_elements 0.95166
published_at 2026-04-07T12:55:00Z
4
value 0.18154
scoring_system epss
scoring_elements 0.95174
published_at 2026-04-08T12:55:00Z
5
value 0.18154
scoring_system epss
scoring_elements 0.95177
published_at 2026-04-09T12:55:00Z
6
value 0.18154
scoring_system epss
scoring_elements 0.95183
published_at 2026-04-11T12:55:00Z
7
value 0.18154
scoring_system epss
scoring_elements 0.95184
published_at 2026-04-12T12:55:00Z
8
value 0.18154
scoring_system epss
scoring_elements 0.95187
published_at 2026-04-13T12:55:00Z
9
value 0.18154
scoring_system epss
scoring_elements 0.95195
published_at 2026-04-16T12:55:00Z
10
value 0.18154
scoring_system epss
scoring_elements 0.95199
published_at 2026-04-18T12:55:00Z
11
value 0.18154
scoring_system epss
scoring_elements 0.952
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0996
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618022
reference_id 1618022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618022
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/27564.txt
reference_id CVE-2006-0996;OSVDB-24484
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/27564.txt
4
reference_url https://www.securityfocus.com/bid/17362/info
reference_id CVE-2006-0996;OSVDB-24484
reference_type exploit
scores
url https://www.securityfocus.com/bid/17362/info
5
reference_url https://security.gentoo.org/glsa/200605-08
reference_id GLSA-200605-08
reference_type
scores
url https://security.gentoo.org/glsa/200605-08
6
reference_url https://access.redhat.com/errata/RHSA-2006:0276
reference_id RHSA-2006:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0276
7
reference_url https://access.redhat.com/errata/RHSA-2006:0501
reference_id RHSA-2006:0501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0501
8
reference_url https://access.redhat.com/errata/RHSA-2006:0549
reference_id RHSA-2006:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0549
9
reference_url https://usn.ubuntu.com/320-1/
reference_id USN-320-1
reference_type
scores
url https://usn.ubuntu.com/320-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@4.4.7
purl pkg:ebuild/dev-lang/php@4.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@4.4.7
1
url pkg:ebuild/dev-lang/php@5.1.4
purl pkg:ebuild/dev-lang/php@5.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4
2
url pkg:ebuild/dev-lang/php@5.1.4-r4
purl pkg:ebuild/dev-lang/php@5.1.4-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4-r4
aliases CVE-2006-0996
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f19-e981-kybs
1
url VCID-9rva-2a4w-k3gk
vulnerability_id VCID-9rva-2a4w-k3gk
summary
PHP is affected by multiple issues, including a buffer overflow in
    wordwrap() which may lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1490
reference_id
reference_type
scores
0
value 0.30649
scoring_system epss
scoring_elements 0.96685
published_at 2026-04-01T12:55:00Z
1
value 0.30649
scoring_system epss
scoring_elements 0.96696
published_at 2026-04-02T12:55:00Z
2
value 0.30649
scoring_system epss
scoring_elements 0.96697
published_at 2026-04-04T12:55:00Z
3
value 0.30649
scoring_system epss
scoring_elements 0.96702
published_at 2026-04-07T12:55:00Z
4
value 0.30649
scoring_system epss
scoring_elements 0.9671
published_at 2026-04-08T12:55:00Z
5
value 0.30649
scoring_system epss
scoring_elements 0.96711
published_at 2026-04-09T12:55:00Z
6
value 0.30649
scoring_system epss
scoring_elements 0.96714
published_at 2026-04-12T12:55:00Z
7
value 0.30649
scoring_system epss
scoring_elements 0.96717
published_at 2026-04-13T12:55:00Z
8
value 0.30649
scoring_system epss
scoring_elements 0.96723
published_at 2026-04-16T12:55:00Z
9
value 0.30649
scoring_system epss
scoring_elements 0.96727
published_at 2026-04-18T12:55:00Z
10
value 0.30649
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1490
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618036
reference_id 1618036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618036
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/27508.txt
reference_id CVE-2006-1490;OSVDB-24248
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/27508.txt
4
reference_url https://www.securityfocus.com/bid/17296/info
reference_id CVE-2006-1490;OSVDB-24248
reference_type exploit
scores
url https://www.securityfocus.com/bid/17296/info
5
reference_url https://security.gentoo.org/glsa/200605-08
reference_id GLSA-200605-08
reference_type
scores
url https://security.gentoo.org/glsa/200605-08
6
reference_url https://access.redhat.com/errata/RHSA-2006:0276
reference_id RHSA-2006:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0276
7
reference_url https://usn.ubuntu.com/320-1/
reference_id USN-320-1
reference_type
scores
url https://usn.ubuntu.com/320-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@4.4.7
purl pkg:ebuild/dev-lang/php@4.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@4.4.7
1
url pkg:ebuild/dev-lang/php@5.1.4
purl pkg:ebuild/dev-lang/php@5.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4
2
url pkg:ebuild/dev-lang/php@5.1.4-r4
purl pkg:ebuild/dev-lang/php@5.1.4-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4-r4
aliases CVE-2006-1490
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rva-2a4w-k3gk
2
url VCID-r834-qnr8-ykes
vulnerability_id VCID-r834-qnr8-ykes
summary
PHP is affected by multiple issues, including a buffer overflow in
    wordwrap() which may lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1990.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1990
reference_id
reference_type
scores
0
value 0.01062
scoring_system epss
scoring_elements 0.77685
published_at 2026-04-21T12:55:00Z
1
value 0.01062
scoring_system epss
scoring_elements 0.77674
published_at 2026-04-11T12:55:00Z
2
value 0.01062
scoring_system epss
scoring_elements 0.77657
published_at 2026-04-12T12:55:00Z
3
value 0.01062
scoring_system epss
scoring_elements 0.77656
published_at 2026-04-13T12:55:00Z
4
value 0.01062
scoring_system epss
scoring_elements 0.77693
published_at 2026-04-16T12:55:00Z
5
value 0.01062
scoring_system epss
scoring_elements 0.77692
published_at 2026-04-18T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-01T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79148
published_at 2026-04-02T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.79173
published_at 2026-04-04T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79159
published_at 2026-04-07T12:55:00Z
10
value 0.01234
scoring_system epss
scoring_elements 0.79184
published_at 2026-04-08T12:55:00Z
11
value 0.01234
scoring_system epss
scoring_elements 0.79192
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1990
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618082
reference_id 1618082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618082
3
reference_url https://security.gentoo.org/glsa/200605-08
reference_id GLSA-200605-08
reference_type
scores
url https://security.gentoo.org/glsa/200605-08
4
reference_url https://access.redhat.com/errata/RHSA-2006:0501
reference_id RHSA-2006:0501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0501
5
reference_url https://access.redhat.com/errata/RHSA-2006:0549
reference_id RHSA-2006:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0549
6
reference_url https://access.redhat.com/errata/RHSA-2006:0568
reference_id RHSA-2006:0568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0568
7
reference_url https://usn.ubuntu.com/320-1/
reference_id USN-320-1
reference_type
scores
url https://usn.ubuntu.com/320-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@4.4.7
purl pkg:ebuild/dev-lang/php@4.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@4.4.7
1
url pkg:ebuild/dev-lang/php@5.1.4
purl pkg:ebuild/dev-lang/php@5.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4
2
url pkg:ebuild/dev-lang/php@5.1.4-r4
purl pkg:ebuild/dev-lang/php@5.1.4-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4-r4
aliases CVE-2006-1990
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r834-qnr8-ykes
3
url VCID-zttk-z2mk-cucz
vulnerability_id VCID-zttk-z2mk-cucz
summary
PHP is affected by multiple issues, including a buffer overflow in
    wordwrap() which may lead to execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1991
reference_id
reference_type
scores
0
value 0.03647
scoring_system epss
scoring_elements 0.87806
published_at 2026-04-01T12:55:00Z
1
value 0.03647
scoring_system epss
scoring_elements 0.87816
published_at 2026-04-02T12:55:00Z
2
value 0.03647
scoring_system epss
scoring_elements 0.87827
published_at 2026-04-04T12:55:00Z
3
value 0.03647
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-07T12:55:00Z
4
value 0.03647
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-08T12:55:00Z
5
value 0.03647
scoring_system epss
scoring_elements 0.87859
published_at 2026-04-09T12:55:00Z
6
value 0.03647
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-11T12:55:00Z
7
value 0.03647
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-12T12:55:00Z
8
value 0.03647
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-13T12:55:00Z
9
value 0.03647
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-16T12:55:00Z
10
value 0.03647
scoring_system epss
scoring_elements 0.87875
published_at 2026-04-18T12:55:00Z
11
value 0.03647
scoring_system epss
scoring_elements 0.87873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1991
1
reference_url https://security.gentoo.org/glsa/200605-08
reference_id GLSA-200605-08
reference_type
scores
url https://security.gentoo.org/glsa/200605-08
2
reference_url https://usn.ubuntu.com/320-1/
reference_id USN-320-1
reference_type
scores
url https://usn.ubuntu.com/320-1/
fixed_packages
0
url pkg:ebuild/dev-lang/php@4.4.7
purl pkg:ebuild/dev-lang/php@4.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@4.4.7
1
url pkg:ebuild/dev-lang/php@5.1.4
purl pkg:ebuild/dev-lang/php@5.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4
2
url pkg:ebuild/dev-lang/php@5.1.4-r4
purl pkg:ebuild/dev-lang/php@5.1.4-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4-r4
aliases CVE-2006-1991
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zttk-z2mk-cucz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.1.4