Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
Typedeb
Namespacedebian
Namephp8.2
Version8.2.29-1~deb12u1
Qualifiers
distro bookworm
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.2.30-1~deb12u1
Latest_non_vulnerable_version8.2.30-1~deb12u1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1re1-15w4-cqeq
vulnerability_id VCID-1re1-15w4-cqeq
summary php: Leak partial content of the heap through heap buffer over-read in mysqlnd
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
reference_id
reference_type
scores
0
value 0.00663
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-26T12:55:00Z
1
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-12T12:55:00Z
2
value 0.00663
scoring_system epss
scoring_elements 0.71169
published_at 2026-04-13T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71215
published_at 2026-04-16T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71221
published_at 2026-04-18T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71253
published_at 2026-04-24T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71121
published_at 2026-04-07T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.71163
published_at 2026-04-08T12:55:00Z
8
value 0.00663
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-09T12:55:00Z
9
value 0.00663
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-21T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71566
published_at 2026-04-02T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71584
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
reference_id 2327960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
reference_id GHSA-h35g-vwh6-m678
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-22T17:37:12Z/
url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.26-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-8929
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1re1-15w4-cqeq
1
url VCID-26ab-3bt8-jkf3
vulnerability_id VCID-26ab-3bt8-jkf3
summary php: heap-based buffer overflow in array_merge()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14178
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05863
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.0611
published_at 2026-04-26T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05905
published_at 2026-04-18T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06057
published_at 2026-04-21T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06081
published_at 2026-04-24T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05896
published_at 2026-04-04T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05889
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05927
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05966
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-11T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05929
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05895
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
reference_id 1123574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425625
reference_id 2425625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425625
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2
reference_id GHSA-h96m-rvf9-jgm2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-29T16:00:50Z/
url https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2
7
reference_url https://access.redhat.com/errata/RHSA-2026:1169
reference_id RHSA-2026:1169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1169
8
reference_url https://access.redhat.com/errata/RHSA-2026:1185
reference_id RHSA-2026:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1185
9
reference_url https://access.redhat.com/errata/RHSA-2026:1187
reference_id RHSA-2026:1187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1187
10
reference_url https://access.redhat.com/errata/RHSA-2026:1190
reference_id RHSA-2026:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1190
11
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
12
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
13
reference_url https://access.redhat.com/errata/RHSA-2026:1429
reference_id RHSA-2026:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1429
14
reference_url https://access.redhat.com/errata/RHSA-2026:1628
reference_id RHSA-2026:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1628
15
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
16
reference_url https://access.redhat.com/errata/RHSA-2026:2799
reference_id RHSA-2026:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2799
17
reference_url https://access.redhat.com/errata/RHSA-2026:4077
reference_id RHSA-2026:4077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4077
18
reference_url https://access.redhat.com/errata/RHSA-2026:4086
reference_id RHSA-2026:4086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4086
19
reference_url https://access.redhat.com/errata/RHSA-2026:4212
reference_id RHSA-2026:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4212
20
reference_url https://access.redhat.com/errata/RHSA-2026:4266
reference_id RHSA-2026:4266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4266
21
reference_url https://access.redhat.com/errata/RHSA-2026:4507
reference_id RHSA-2026:4507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4507
22
reference_url https://access.redhat.com/errata/RHSA-2026:4514
reference_id RHSA-2026:4514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4514
23
reference_url https://access.redhat.com/errata/RHSA-2026:4517
reference_id RHSA-2026:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4517
24
reference_url https://access.redhat.com/errata/RHSA-2026:7614
reference_id RHSA-2026:7614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7614
25
reference_url https://usn.ubuntu.com/7953-1/
reference_id USN-7953-1
reference_type
scores
url https://usn.ubuntu.com/7953-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.30-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-14178
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26ab-3bt8-jkf3
2
url VCID-32yk-5b4h-4bfv
vulnerability_id VCID-32yk-5b4h-4bfv
summary php: Fail to Escape Arguments Properly in Microsoft Windows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1874.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1874
reference_id
reference_type
scores
0
value 0.63376
scoring_system epss
scoring_elements 0.98394
published_at 2026-04-02T12:55:00Z
1
value 0.63376
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-26T12:55:00Z
2
value 0.63376
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-24T12:55:00Z
3
value 0.63376
scoring_system epss
scoring_elements 0.98412
published_at 2026-04-21T12:55:00Z
4
value 0.63376
scoring_system epss
scoring_elements 0.98407
published_at 2026-04-13T12:55:00Z
5
value 0.63376
scoring_system epss
scoring_elements 0.98404
published_at 2026-04-09T12:55:00Z
6
value 0.63376
scoring_system epss
scoring_elements 0.98403
published_at 2026-04-08T12:55:00Z
7
value 0.63376
scoring_system epss
scoring_elements 0.984
published_at 2026-04-07T12:55:00Z
8
value 0.63376
scoring_system epss
scoring_elements 0.98397
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1874
2
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
3
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267262
reference_id 2267262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267262
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7
reference_id GHSA-pc52-254m-w9w7
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7
6
reference_url https://security.netapp.com/advisory/ntap-20240510-0009/
reference_id ntap-20240510-0009
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url https://security.netapp.com/advisory/ntap-20240510-0009/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-04-29T13:05:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
0
url pkg:deb/debian/php8.2@0?distro=bookworm
purl pkg:deb/debian/php8.2@0?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@0%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-1874
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32yk-5b4h-4bfv
3
url VCID-341r-8amt-z7dr
vulnerability_id VCID-341r-8amt-z7dr
summary php: Configuring a proxy in a stream context might allow for CRLF injection in URIs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-26T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78514
published_at 2026-04-13T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78539
published_at 2026-04-11T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-12T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78541
published_at 2026-04-18T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.78538
published_at 2026-04-21T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-24T12:55:00Z
7
value 0.01559
scoring_system epss
scoring_elements 0.81434
published_at 2026-04-07T12:55:00Z
8
value 0.01559
scoring_system epss
scoring_elements 0.81462
published_at 2026-04-08T12:55:00Z
9
value 0.02098
scoring_system epss
scoring_elements 0.83996
published_at 2026-04-02T12:55:00Z
10
value 0.02098
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
reference_id 2328523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
reference_id GHSA-c5f2-jwm7-mmq2
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:39Z/
url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.26-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-11234
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-341r-8amt-z7dr
4
url VCID-46m1-33z3-ruhk
vulnerability_id VCID-46m1-33z3-ruhk
summary php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14180.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14180
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10092
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10102
published_at 2026-04-26T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10018
published_at 2026-04-18T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10147
published_at 2026-04-21T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10123
published_at 2026-04-24T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10155
published_at 2026-04-04T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10051
published_at 2026-04-07T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10127
published_at 2026-04-08T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10187
published_at 2026-04-12T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10227
published_at 2026-04-11T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10167
published_at 2026-04-13T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.1004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14180
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
reference_id 1123574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425627
reference_id 2425627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425627
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-8xr5-qppj-gvwj
reference_id GHSA-8xr5-qppj-gvwj
reference_type
scores
0
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-29T15:59:59Z/
url https://github.com/php/php-src/security/advisories/GHSA-8xr5-qppj-gvwj
6
reference_url https://access.redhat.com/errata/RHSA-2026:1169
reference_id RHSA-2026:1169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1169
7
reference_url https://access.redhat.com/errata/RHSA-2026:1185
reference_id RHSA-2026:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1185
8
reference_url https://access.redhat.com/errata/RHSA-2026:1187
reference_id RHSA-2026:1187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1187
9
reference_url https://access.redhat.com/errata/RHSA-2026:1190
reference_id RHSA-2026:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1190
10
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
11
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
12
reference_url https://access.redhat.com/errata/RHSA-2026:1429
reference_id RHSA-2026:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1429
13
reference_url https://access.redhat.com/errata/RHSA-2026:1628
reference_id RHSA-2026:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1628
14
reference_url https://access.redhat.com/errata/RHSA-2026:3713
reference_id RHSA-2026:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3713
15
reference_url https://access.redhat.com/errata/RHSA-2026:7614
reference_id RHSA-2026:7614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7614
16
reference_url https://usn.ubuntu.com/7953-1/
reference_id USN-7953-1
reference_type
scores
url https://usn.ubuntu.com/7953-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.30-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-14180
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46m1-33z3-ruhk
5
url VCID-53h9-y2ns-jfh1
vulnerability_id VCID-53h9-y2ns-jfh1
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63677
published_at 2026-04-26T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63653
published_at 2026-04-16T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63662
published_at 2026-04-18T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-21T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63596
published_at 2026-04-02T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63581
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63633
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63649
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-24T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63616
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
reference_id 2317051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
reference_id GHSA-94p6-54jq-9mwp
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:50:40Z/
url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.24-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-8927
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53h9-y2ns-jfh1
6
url VCID-5jts-46jw-tfdp
vulnerability_id VCID-5jts-46jw-tfdp
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5585.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5585
reference_id
reference_type
scores
0
value 0.00874
scoring_system epss
scoring_elements 0.75351
published_at 2026-04-26T12:55:00Z
1
value 0.00874
scoring_system epss
scoring_elements 0.75257
published_at 2026-04-04T12:55:00Z
2
value 0.00874
scoring_system epss
scoring_elements 0.75234
published_at 2026-04-07T12:55:00Z
3
value 0.00874
scoring_system epss
scoring_elements 0.75276
published_at 2026-04-08T12:55:00Z
4
value 0.00874
scoring_system epss
scoring_elements 0.75287
published_at 2026-04-09T12:55:00Z
5
value 0.00874
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-11T12:55:00Z
6
value 0.00874
scoring_system epss
scoring_elements 0.75286
published_at 2026-04-12T12:55:00Z
7
value 0.00874
scoring_system epss
scoring_elements 0.75275
published_at 2026-04-13T12:55:00Z
8
value 0.00874
scoring_system epss
scoring_elements 0.75314
published_at 2026-04-16T12:55:00Z
9
value 0.00874
scoring_system epss
scoring_elements 0.75321
published_at 2026-04-18T12:55:00Z
10
value 0.00874
scoring_system epss
scoring_elements 0.75312
published_at 2026-04-21T12:55:00Z
11
value 0.00874
scoring_system epss
scoring_elements 0.75347
published_at 2026-04-24T12:55:00Z
12
value 0.00874
scoring_system epss
scoring_elements 0.75226
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5585
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-16T17:52:45Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291311
reference_id 2291311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291311
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385
reference_id GHSA-9fcc-425m-g385
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-16T17:52:45Z/
url https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385
6
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
7
reference_url https://security.netapp.com/advisory/ntap-20240726-0002/
reference_id ntap-20240726-0002
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-16T17:52:45Z/
url https://security.netapp.com/advisory/ntap-20240726-0002/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-16T17:52:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-16T17:52:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
0
url pkg:deb/debian/php8.2@0?distro=bookworm
purl pkg:deb/debian/php8.2@0?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@0%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-5585
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jts-46jw-tfdp
7
url VCID-6g29-te13-kucu
vulnerability_id VCID-6g29-te13-kucu
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-26T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75206
published_at 2026-04-16T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75212
published_at 2026-04-18T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75239
published_at 2026-04-24T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75127
published_at 2026-04-02T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75157
published_at 2026-04-04T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75134
published_at 2026-04-07T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75168
published_at 2026-04-13T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-12T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75202
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
reference_id 2317144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
reference_id GHSA-865w-9rf3-2wh5
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:47:58Z/
url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.24-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-9026
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g29-te13-kucu
8
url VCID-7151-69v8-cqaj
vulnerability_id VCID-7151-69v8-cqaj
summary php: Integer overflow in the firebird and dblib quoters causing OOB writes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11236
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55656
published_at 2026-04-09T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.556
published_at 2026-04-02T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-04T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55601
published_at 2026-04-07T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55653
published_at 2026-04-08T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-11T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55645
published_at 2026-04-12T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55628
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-21T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.634
published_at 2026-04-26T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63383
published_at 2026-04-16T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63391
published_at 2026-04-18T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63387
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11236
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328522
reference_id 2328522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328522
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
reference_id GHSA-5hqh-c84r-qjcv
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-24T12:32:23Z/
url https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
7
reference_url https://usn.ubuntu.com/7153-1/
reference_id USN-7153-1
reference_type
scores
url https://usn.ubuntu.com/7153-1/
8
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.26-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-11236
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7151-69v8-cqaj
9
url VCID-7qqj-hp6m-z7bh
vulnerability_id VCID-7qqj-hp6m-z7bh
summary php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6491
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45447
published_at 2026-04-04T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45427
published_at 2026-04-02T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.45392
published_at 2026-04-07T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48572
published_at 2026-04-26T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48623
published_at 2026-04-16T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48618
published_at 2026-04-18T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48576
published_at 2026-04-21T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48569
published_at 2026-04-08T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48566
published_at 2026-04-09T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48587
published_at 2026-04-11T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.4856
published_at 2026-04-24T12:55:00Z
11
value 0.00252
scoring_system epss
scoring_elements 0.48573
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2378690
reference_id 2378690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2378690
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
reference_id GHSA-453j-q27h-5p8x
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:59:51Z/
url https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-6491
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qqj-hp6m-z7bh
10
url VCID-9byf-ymwr-eug8
vulnerability_id VCID-9byf-ymwr-eug8
summary php: Single byte overread with convert.quoted-printable-decode filter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-26T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72676
published_at 2026-04-18T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-21T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72709
published_at 2026-04-24T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-02T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.726
published_at 2026-04-04T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-07T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-08T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-09T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-11T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-12T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72623
published_at 2026-04-13T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.72665
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
reference_id 2328521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
reference_id GHSA-r977-prxv-hc43
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:59Z/
url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.26-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-11233
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9byf-ymwr-eug8
11
url VCID-9p3x-8hp1-2bge
vulnerability_id VCID-9p3x-8hp1-2bge
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0568.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0568
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40635
published_at 2026-04-02T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.4043
published_at 2026-04-26T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40606
published_at 2026-04-13T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40653
published_at 2026-04-16T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-18T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40546
published_at 2026-04-21T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40443
published_at 2026-04-24T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40662
published_at 2026-04-11T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40584
published_at 2026-04-07T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40634
published_at 2026-04-08T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40644
published_at 2026-04-09T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
reference_id 1031368
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170770
reference_id 2170770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170770
9
reference_url https://bugs.php.net/bug.php?id=81746
reference_id bug.php?id=81746
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-18T14:56:58Z/
url https://bugs.php.net/bug.php?id=81746
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://security.netapp.com/advisory/ntap-20230517-0001/
reference_id ntap-20230517-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-18T14:56:58Z/
url https://security.netapp.com/advisory/ntap-20230517-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
13
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
14
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
15
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
16
reference_url https://usn.ubuntu.com/5902-1/
reference_id USN-5902-1
reference_type
scores
url https://usn.ubuntu.com/5902-1/
17
reference_url https://usn.ubuntu.com/5905-1/
reference_id USN-5905-1
reference_type
scores
url https://usn.ubuntu.com/5905-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.4-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-0568
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p3x-8hp1-2bge
12
url VCID-a21g-6nbb-fbb1
vulnerability_id VCID-a21g-6nbb-fbb1
summary php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3247.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3247
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46067
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.4608
published_at 2026-04-26T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46145
published_at 2026-04-18T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.4609
published_at 2026-04-21T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46071
published_at 2026-04-24T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46089
published_at 2026-04-09T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46036
published_at 2026-04-07T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.46092
published_at 2026-04-08T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46113
published_at 2026-04-11T12:55:00Z
9
value 0.00232
scoring_system epss
scoring_elements 0.46085
published_at 2026-04-12T12:55:00Z
10
value 0.00232
scoring_system epss
scoring_elements 0.46094
published_at 2026-04-13T12:55:00Z
11
value 0.00232
scoring_system epss
scoring_elements 0.46149
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3247
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219290
reference_id 2219290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219290
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw
reference_id GHSA-76gg-c692-v2mw
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T19:41:48Z/
url https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw
6
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
7
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
8
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
9
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
10
reference_url https://usn.ubuntu.com/6199-1/
reference_id USN-6199-1
reference_type
scores
url https://usn.ubuntu.com/6199-1/
11
reference_url https://usn.ubuntu.com/6199-2/
reference_id USN-6199-2
reference_type
scores
url https://usn.ubuntu.com/6199-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.7-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.7-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.7-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-3247
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a21g-6nbb-fbb1
13
url VCID-bf18-3zx5-f7gr
vulnerability_id VCID-bf18-3zx5-f7gr
summary php: Header parser of http stream wrapper does not handle folded headers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1217
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2253
published_at 2026-04-04T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22487
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27094
published_at 2026-04-09T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27049
published_at 2026-04-08T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-11T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27053
published_at 2026-04-12T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26996
published_at 2026-04-13T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27005
published_at 2026-04-16T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26979
published_at 2026-04-18T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.2698
published_at 2026-04-07T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42347
published_at 2026-04-21T12:55:00Z
11
value 0.00213
scoring_system epss
scoring_elements 0.43816
published_at 2026-04-26T12:55:00Z
12
value 0.00213
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355917
reference_id 2355917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355917
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g
reference_id GHSA-v8xr-gpvj-cx9g
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y/R:A
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:23:16Z/
url https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.28-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1217
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bf18-3zx5-f7gr
14
url VCID-dmvz-493v-mfdr
vulnerability_id VCID-dmvz-493v-mfdr
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3096.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-3096
reference_id
reference_type
scores
0
value 0.01069
scoring_system epss
scoring_elements 0.77794
published_at 2026-04-26T12:55:00Z
1
value 0.01069
scoring_system epss
scoring_elements 0.77708
published_at 2026-04-08T12:55:00Z
2
value 0.01069
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-09T12:55:00Z
3
value 0.01069
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-11T12:55:00Z
4
value 0.01069
scoring_system epss
scoring_elements 0.77724
published_at 2026-04-12T12:55:00Z
5
value 0.01069
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-13T12:55:00Z
6
value 0.01069
scoring_system epss
scoring_elements 0.7776
published_at 2026-04-16T12:55:00Z
7
value 0.01069
scoring_system epss
scoring_elements 0.77759
published_at 2026-04-18T12:55:00Z
8
value 0.01069
scoring_system epss
scoring_elements 0.77753
published_at 2026-04-21T12:55:00Z
9
value 0.01069
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-24T12:55:00Z
10
value 0.01069
scoring_system epss
scoring_elements 0.7767
published_at 2026-04-02T12:55:00Z
11
value 0.01069
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-04T12:55:00Z
12
value 0.01069
scoring_system epss
scoring_elements 0.7768
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-3096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275061
reference_id 2275061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275061
9
reference_url https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
reference_id GHSA-h746-cjrr-wfmr
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
12
reference_url https://security.netapp.com/advisory/ntap-20240510-0010/
reference_id ntap-20240510-0010
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://security.netapp.com/advisory/ntap-20240510-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
14
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
15
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
16
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
17
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
18
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
19
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-3096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmvz-493v-mfdr
15
url VCID-dqb9-fgsz-rycp
vulnerability_id VCID-dqb9-fgsz-rycp
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2756.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2756
reference_id
reference_type
scores
0
value 0.07745
scoring_system epss
scoring_elements 0.91958
published_at 2026-04-26T12:55:00Z
1
value 0.07745
scoring_system epss
scoring_elements 0.91923
published_at 2026-04-07T12:55:00Z
2
value 0.07745
scoring_system epss
scoring_elements 0.91936
published_at 2026-04-08T12:55:00Z
3
value 0.07745
scoring_system epss
scoring_elements 0.91942
published_at 2026-04-09T12:55:00Z
4
value 0.07745
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-11T12:55:00Z
5
value 0.07745
scoring_system epss
scoring_elements 0.91944
published_at 2026-04-12T12:55:00Z
6
value 0.07745
scoring_system epss
scoring_elements 0.91941
published_at 2026-04-13T12:55:00Z
7
value 0.07745
scoring_system epss
scoring_elements 0.9196
published_at 2026-04-24T12:55:00Z
8
value 0.07745
scoring_system epss
scoring_elements 0.91957
published_at 2026-04-18T12:55:00Z
9
value 0.07745
scoring_system epss
scoring_elements 0.91955
published_at 2026-04-21T12:55:00Z
10
value 0.07745
scoring_system epss
scoring_elements 0.91909
published_at 2026-04-02T12:55:00Z
11
value 0.07745
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2756
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275058
reference_id 2275058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275058
9
reference_url https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
reference_id GHSA-wpj3-hf5j-x4v4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
12
reference_url https://security.netapp.com/advisory/ntap-20240510-0008/
reference_id ntap-20240510-0008
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://security.netapp.com/advisory/ntap-20240510-0008/
13
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
14
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
15
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
16
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
17
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
18
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
19
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-2756
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqb9-fgsz-rycp
16
url VCID-e16f-4ynx-fqb9
vulnerability_id VCID-e16f-4ynx-fqb9
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
reference_id
reference_type
scores
0
value 0.03579
scoring_system epss
scoring_elements 0.87775
published_at 2026-04-26T12:55:00Z
1
value 0.03579
scoring_system epss
scoring_elements 0.87695
published_at 2026-04-02T12:55:00Z
2
value 0.03579
scoring_system epss
scoring_elements 0.87707
published_at 2026-04-04T12:55:00Z
3
value 0.03579
scoring_system epss
scoring_elements 0.87709
published_at 2026-04-07T12:55:00Z
4
value 0.03579
scoring_system epss
scoring_elements 0.8773
published_at 2026-04-08T12:55:00Z
5
value 0.03579
scoring_system epss
scoring_elements 0.87736
published_at 2026-04-09T12:55:00Z
6
value 0.03579
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-11T12:55:00Z
7
value 0.03579
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-12T12:55:00Z
8
value 0.03579
scoring_system epss
scoring_elements 0.87739
published_at 2026-04-13T12:55:00Z
9
value 0.03579
scoring_system epss
scoring_elements 0.87753
published_at 2026-04-18T12:55:00Z
10
value 0.03579
scoring_system epss
scoring_elements 0.87752
published_at 2026-04-21T12:55:00Z
11
value 0.03579
scoring_system epss
scoring_elements 0.87768
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
reference_id 1072885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
reference_id 2291252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
7
reference_url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
reference_id GHSA-w8qr-v226-r27w
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
8
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
9
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
10
reference_url https://security.netapp.com/advisory/ntap-20240726-0001/
reference_id ntap-20240726-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://security.netapp.com/advisory/ntap-20240726-0001/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
12
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
13
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
14
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
15
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
16
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
17
reference_url https://usn.ubuntu.com/6841-1/
reference_id USN-6841-1
reference_type
scores
url https://usn.ubuntu.com/6841-1/
18
reference_url https://usn.ubuntu.com/6841-2/
reference_id USN-6841-2
reference_type
scores
url https://usn.ubuntu.com/6841-2/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.20-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.20-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.20-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-5458
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e16f-4ynx-fqb9
17
url VCID-fhh6-shuh-v3am
vulnerability_id VCID-fhh6-shuh-v3am
summary php: potential buffer overflow in php_cli_server_startup_workers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4900
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20282
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20339
published_at 2026-04-04T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20063
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20144
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20202
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20226
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20116
published_at 2026-04-16T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20121
published_at 2026-04-18T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.2012
published_at 2026-04-21T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20003
published_at 2026-04-24T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.19998
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179880
reference_id 2179880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179880
5
reference_url https://access.redhat.com/errata/RHSA-2023:0848
reference_id RHSA-2023:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0848
6
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
7
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
0
url pkg:deb/debian/php8.2@0?distro=bookworm
purl pkg:deb/debian/php8.2@0?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@0%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2022-4900
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhh6-shuh-v3am
18
url VCID-fyhr-st6h-eker
vulnerability_id VCID-fyhr-st6h-eker
summary php: PHP Hostname Null Character Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1220
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.1132
published_at 2026-04-04T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11261
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15356
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15804
published_at 2026-04-26T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15741
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15785
published_at 2026-04-21T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15806
published_at 2026-04-24T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15877
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.1594
published_at 2026-04-09T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15916
published_at 2026-04-11T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15809
published_at 2026-04-13T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379792
reference_id 2379792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379792
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r
reference_id GHSA-3cr5-j632-f35r
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:46Z/
url https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1220
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fyhr-st6h-eker
19
url VCID-g2sk-sa2j-dkcv
vulnerability_id VCID-g2sk-sa2j-dkcv
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3824.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3824
reference_id
reference_type
scores
0
value 0.32366
scoring_system epss
scoring_elements 0.96858
published_at 2026-04-26T12:55:00Z
1
value 0.32366
scoring_system epss
scoring_elements 0.96849
published_at 2026-04-16T12:55:00Z
2
value 0.32366
scoring_system epss
scoring_elements 0.96853
published_at 2026-04-18T12:55:00Z
3
value 0.32366
scoring_system epss
scoring_elements 0.96855
published_at 2026-04-21T12:55:00Z
4
value 0.32366
scoring_system epss
scoring_elements 0.96856
published_at 2026-04-24T12:55:00Z
5
value 0.32366
scoring_system epss
scoring_elements 0.96837
published_at 2026-04-08T12:55:00Z
6
value 0.32366
scoring_system epss
scoring_elements 0.96838
published_at 2026-04-09T12:55:00Z
7
value 0.32366
scoring_system epss
scoring_elements 0.9684
published_at 2026-04-11T12:55:00Z
8
value 0.32366
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-12T12:55:00Z
9
value 0.32366
scoring_system epss
scoring_elements 0.96842
published_at 2026-04-13T12:55:00Z
10
value 0.34999
scoring_system epss
scoring_elements 0.97005
published_at 2026-04-02T12:55:00Z
11
value 0.34999
scoring_system epss
scoring_elements 0.97009
published_at 2026-04-04T12:55:00Z
12
value 0.34999
scoring_system epss
scoring_elements 0.9701
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043477
reference_id 1043477
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043477
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230101
reference_id 2230101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230101
9
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
10
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
11
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
12
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
13
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
14
reference_url https://usn.ubuntu.com/6305-1/
reference_id USN-6305-1
reference_type
scores
url https://usn.ubuntu.com/6305-1/
15
reference_url https://usn.ubuntu.com/6305-2/
reference_id USN-6305-2
reference_type
scores
url https://usn.ubuntu.com/6305-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-3824
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2sk-sa2j-dkcv
20
url VCID-gu2y-9qzw-8ke4
vulnerability_id VCID-gu2y-9qzw-8ke4
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3823.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3823
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.56953
published_at 2026-04-02T12:55:00Z
1
value 0.00343
scoring_system epss
scoring_elements 0.56975
published_at 2026-04-04T12:55:00Z
2
value 0.00343
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-07T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.57002
published_at 2026-04-08T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.57004
published_at 2026-04-09T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.57012
published_at 2026-04-11T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.56991
published_at 2026-04-12T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.56968
published_at 2026-04-13T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56997
published_at 2026-04-16T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.56994
published_at 2026-04-18T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.5697
published_at 2026-04-21T12:55:00Z
11
value 0.00343
scoring_system epss
scoring_elements 0.5691
published_at 2026-04-24T12:55:00Z
12
value 0.00343
scoring_system epss
scoring_elements 0.56928
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043477
reference_id 1043477
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043477
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2229396
reference_id 2229396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2229396
9
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
10
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
11
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
12
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
13
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
14
reference_url https://usn.ubuntu.com/6305-1/
reference_id USN-6305-1
reference_type
scores
url https://usn.ubuntu.com/6305-1/
15
reference_url https://usn.ubuntu.com/6305-2/
reference_id USN-6305-2
reference_type
scores
url https://usn.ubuntu.com/6305-2/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-3823
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2y-9qzw-8ke4
21
url VCID-h7pk-y5gm-kyg7
vulnerability_id VCID-h7pk-y5gm-kyg7
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0567.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0567
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1787
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1758
published_at 2026-04-26T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-11T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-12T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17698
published_at 2026-04-13T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17645
published_at 2026-04-16T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17654
published_at 2026-04-18T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-21T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17603
published_at 2026-04-24T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17923
published_at 2026-04-04T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17624
published_at 2026-04-07T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17712
published_at 2026-04-08T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17773
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
reference_id 1031368
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170771
reference_id 2170771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170771
9
reference_url https://bugs.php.net/bug.php?id=81744
reference_id bug.php?id=81744
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:34:47Z/
url https://bugs.php.net/bug.php?id=81744
10
reference_url https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4
reference_id GHSA-7fj2-8x79-rjf4
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-01T15:34:47Z/
url https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4
11
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
12
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
13
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
14
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
15
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
16
reference_url https://usn.ubuntu.com/5902-1/
reference_id USN-5902-1
reference_type
scores
url https://usn.ubuntu.com/5902-1/
17
reference_url https://usn.ubuntu.com/6053-1/
reference_id USN-6053-1
reference_type
scores
url https://usn.ubuntu.com/6053-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.4-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-0567
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7pk-y5gm-kyg7
22
url VCID-j3zk-dv2g-77cv
vulnerability_id VCID-j3zk-dv2g-77cv
summary php: potential exposure to Marvin attack via unsafe implementation of RSA decryption API
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2408.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2408
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48876
published_at 2026-04-26T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48891
published_at 2026-04-11T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.48865
published_at 2026-04-12T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48874
published_at 2026-04-13T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48922
published_at 2026-04-16T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48918
published_at 2026-04-18T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48879
published_at 2026-04-21T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48867
published_at 2026-04-24T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-02T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.4887
published_at 2026-04-04T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48824
published_at 2026-04-07T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48878
published_at 2026-04-08T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.48875
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270358
reference_id 2270358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270358
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864
reference_id GHSA-hh26-4ppw-5864
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
7
reference_url https://access.redhat.com/errata/RHSA-2023:7877
reference_id RHSA-2023:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7877
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-2408
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3zk-dv2g-77cv
23
url VCID-mtw1-k8na-2udv
vulnerability_id VCID-mtw1-k8na-2udv
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31631.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31631
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.71555
published_at 2026-04-02T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71671
published_at 2026-04-26T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.71635
published_at 2026-04-18T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-21T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71666
published_at 2026-04-24T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71573
published_at 2026-04-04T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71546
published_at 2026-04-07T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.71585
published_at 2026-04-13T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71596
published_at 2026-04-09T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71619
published_at 2026-04-11T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71604
published_at 2026-04-12T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.7163
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2158791
reference_id 2158791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2158791
8
reference_url https://bugs.php.net/bug.php?id=81740
reference_id bug.php?id=81740
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-13T16:06:19Z/
url https://bugs.php.net/bug.php?id=81740
9
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
10
reference_url https://access.redhat.com/errata/RHSA-2023:0848
reference_id RHSA-2023:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0848
11
reference_url https://access.redhat.com/errata/RHSA-2023:0965
reference_id RHSA-2023:0965
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0965
12
reference_url https://access.redhat.com/errata/RHSA-2023:2417
reference_id RHSA-2023:2417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2417
13
reference_url https://access.redhat.com/errata/RHSA-2023:2903
reference_id RHSA-2023:2903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2903
14
reference_url https://usn.ubuntu.com/5818-1/
reference_id USN-5818-1
reference_type
scores
url https://usn.ubuntu.com/5818-1/
15
reference_url https://usn.ubuntu.com/5905-1/
reference_id USN-5905-1
reference_type
scores
url https://usn.ubuntu.com/5905-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.1-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.1-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.1-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2022-31631
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtw1-k8na-2udv
24
url VCID-nrnn-pgxj-xugg
vulnerability_id VCID-nrnn-pgxj-xugg
summary php: Stream HTTP wrapper truncates redirect location to 1024 bytes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1861
reference_id
reference_type
scores
0
value 0.00705
scoring_system epss
scoring_elements 0.72086
published_at 2026-04-04T12:55:00Z
1
value 0.00705
scoring_system epss
scoring_elements 0.72065
published_at 2026-04-02T12:55:00Z
2
value 0.00935
scoring_system epss
scoring_elements 0.76157
published_at 2026-04-09T12:55:00Z
3
value 0.00935
scoring_system epss
scoring_elements 0.76144
published_at 2026-04-08T12:55:00Z
4
value 0.00935
scoring_system epss
scoring_elements 0.76182
published_at 2026-04-11T12:55:00Z
5
value 0.00935
scoring_system epss
scoring_elements 0.76158
published_at 2026-04-12T12:55:00Z
6
value 0.00935
scoring_system epss
scoring_elements 0.76155
published_at 2026-04-13T12:55:00Z
7
value 0.00935
scoring_system epss
scoring_elements 0.76197
published_at 2026-04-16T12:55:00Z
8
value 0.00935
scoring_system epss
scoring_elements 0.762
published_at 2026-04-18T12:55:00Z
9
value 0.00935
scoring_system epss
scoring_elements 0.76111
published_at 2026-04-07T12:55:00Z
10
value 0.0098
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-21T12:55:00Z
11
value 0.0103
scoring_system epss
scoring_elements 0.77398
published_at 2026-04-26T12:55:00Z
12
value 0.0103
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356046
reference_id 2356046
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356046
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff
reference_id GHSA-52jp-hrpf-2jff
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:55:53Z/
url https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.28-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1861
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnn-pgxj-xugg
25
url VCID-qymx-je6t-23a6
vulnerability_id VCID-qymx-je6t-23a6
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2757.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2757
reference_id
reference_type
scores
0
value 0.00625
scoring_system epss
scoring_elements 0.70268
published_at 2026-04-26T12:55:00Z
1
value 0.00625
scoring_system epss
scoring_elements 0.70205
published_at 2026-04-11T12:55:00Z
2
value 0.00625
scoring_system epss
scoring_elements 0.7019
published_at 2026-04-12T12:55:00Z
3
value 0.00625
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-13T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.7022
published_at 2026-04-16T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70229
published_at 2026-04-18T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70208
published_at 2026-04-21T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.7026
published_at 2026-04-24T12:55:00Z
8
value 0.00625
scoring_system epss
scoring_elements 0.70126
published_at 2026-04-02T12:55:00Z
9
value 0.00625
scoring_system epss
scoring_elements 0.70141
published_at 2026-04-04T12:55:00Z
10
value 0.00625
scoring_system epss
scoring_elements 0.70118
published_at 2026-04-07T12:55:00Z
11
value 0.00625
scoring_system epss
scoring_elements 0.70166
published_at 2026-04-08T12:55:00Z
12
value 0.00625
scoring_system epss
scoring_elements 0.70182
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2757
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T11:27:03Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275068
reference_id 2275068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275068
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq
reference_id GHSA-fjp9-9hwx-59fq
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T11:27:03Z/
url https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq
6
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
7
reference_url https://security.netapp.com/advisory/ntap-20240510-0011/
reference_id ntap-20240510-0011
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T11:27:03Z/
url https://security.netapp.com/advisory/ntap-20240510-0011/
fixed_packages
0
url pkg:deb/debian/php8.2@0?distro=bookworm
purl pkg:deb/debian/php8.2@0?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@0%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-2757
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qymx-je6t-23a6
26
url VCID-qyx5-b321-2udm
vulnerability_id VCID-qyx5-b321-2udm
summary php: Stream HTTP wrapper header check might omit basic auth header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1736
reference_id
reference_type
scores
0
value 0.00486
scoring_system epss
scoring_elements 0.65377
published_at 2026-04-04T12:55:00Z
1
value 0.00486
scoring_system epss
scoring_elements 0.65351
published_at 2026-04-02T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66802
published_at 2026-04-21T12:55:00Z
3
value 0.00546
scoring_system epss
scoring_elements 0.67878
published_at 2026-04-26T12:55:00Z
4
value 0.00546
scoring_system epss
scoring_elements 0.67868
published_at 2026-04-24T12:55:00Z
5
value 0.00645
scoring_system epss
scoring_elements 0.70633
published_at 2026-04-07T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.70679
published_at 2026-04-08T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70695
published_at 2026-04-09T12:55:00Z
8
value 0.00645
scoring_system epss
scoring_elements 0.70718
published_at 2026-04-11T12:55:00Z
9
value 0.00645
scoring_system epss
scoring_elements 0.70701
published_at 2026-04-12T12:55:00Z
10
value 0.00645
scoring_system epss
scoring_elements 0.70686
published_at 2026-04-13T12:55:00Z
11
value 0.00645
scoring_system epss
scoring_elements 0.70731
published_at 2026-04-16T12:55:00Z
12
value 0.00645
scoring_system epss
scoring_elements 0.70738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356041
reference_id 2356041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356041
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528
reference_id GHSA-hgf5-96fm-v528
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:57:12Z/
url https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.28-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1736
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx5-b321-2udm
27
url VCID-rh5h-at8n-bfdj
vulnerability_id VCID-rh5h-at8n-bfdj
summary php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14177.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14177
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18706
published_at 2026-04-02T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18371
published_at 2026-04-26T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18464
published_at 2026-04-18T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18486
published_at 2026-04-21T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18387
published_at 2026-04-24T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18761
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18477
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18557
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.1861
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18613
published_at 2026-04-11T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18566
published_at 2026-04-12T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18514
published_at 2026-04-13T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18455
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14177
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
reference_id 1123574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425626
reference_id 2425626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425626
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-3237-qqm7-mfv7
reference_id GHSA-3237-qqm7-mfv7
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-29T16:01:25Z/
url https://github.com/php/php-src/security/advisories/GHSA-3237-qqm7-mfv7
6
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
7
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
8
reference_url https://access.redhat.com/errata/RHSA-2026:1429
reference_id RHSA-2026:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1429
9
reference_url https://access.redhat.com/errata/RHSA-2026:1628
reference_id RHSA-2026:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1628
10
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
11
reference_url https://access.redhat.com/errata/RHSA-2026:2799
reference_id RHSA-2026:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2799
12
reference_url https://access.redhat.com/errata/RHSA-2026:7614
reference_id RHSA-2026:7614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7614
13
reference_url https://usn.ubuntu.com/7953-1/
reference_id USN-7953-1
reference_type
scores
url https://usn.ubuntu.com/7953-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.30-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.30-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-14177
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rh5h-at8n-bfdj
28
url VCID-t862-kese-z7ae
vulnerability_id VCID-t862-kese-z7ae
summary php: libxml streams use wrong content-type header when requesting a redirected resource
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1219
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20657
published_at 2026-04-09T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20598
published_at 2026-04-08T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20677
published_at 2026-04-11T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20635
published_at 2026-04-12T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20583
published_at 2026-04-13T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2057
published_at 2026-04-16T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20568
published_at 2026-04-18T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20803
published_at 2026-04-04T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20522
published_at 2026-04-07T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25048
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25793
published_at 2026-04-24T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25786
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356043
reference_id 2356043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356043
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc
reference_id GHSA-p3x9-6h7p-cgfc
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:10:21Z/
url https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.28-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1219
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t862-kese-z7ae
29
url VCID-ugx8-uqup-n3b4
vulnerability_id VCID-ugx8-uqup-n3b4
summary php: OOB access in ldap_escape
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8932
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.5117
published_at 2026-04-09T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51137
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51161
published_at 2026-04-04T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51118
published_at 2026-04-07T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51173
published_at 2026-04-08T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51214
published_at 2026-04-11T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51192
published_at 2026-04-12T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.5928
published_at 2026-04-18T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59261
published_at 2026-04-26T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-24T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59237
published_at 2026-04-13T12:55:00Z
11
value 0.00377
scoring_system epss
scoring_elements 0.59274
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327961
reference_id 2327961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327961
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
reference_id GHSA-g665-fm4p-vhff
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-22T17:41:35Z/
url https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
7
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
8
reference_url https://usn.ubuntu.com/7157-2/
reference_id USN-7157-2
reference_type
scores
url https://usn.ubuntu.com/7157-2/
9
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.26-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.26-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-8932
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugx8-uqup-n3b4
30
url VCID-uqrh-9nue-rqgx
vulnerability_id VCID-uqrh-9nue-rqgx
summary php: Streams HTTP wrapper does not fail for headers with invalid name and no colon
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1734
reference_id
reference_type
scores
0
value 0.00382
scoring_system epss
scoring_elements 0.59546
published_at 2026-04-02T12:55:00Z
1
value 0.00382
scoring_system epss
scoring_elements 0.59603
published_at 2026-04-09T12:55:00Z
2
value 0.00382
scoring_system epss
scoring_elements 0.59591
published_at 2026-04-08T12:55:00Z
3
value 0.00382
scoring_system epss
scoring_elements 0.59622
published_at 2026-04-11T12:55:00Z
4
value 0.00382
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-12T12:55:00Z
5
value 0.00382
scoring_system epss
scoring_elements 0.59585
published_at 2026-04-13T12:55:00Z
6
value 0.00382
scoring_system epss
scoring_elements 0.59618
published_at 2026-04-16T12:55:00Z
7
value 0.00382
scoring_system epss
scoring_elements 0.59625
published_at 2026-04-18T12:55:00Z
8
value 0.00382
scoring_system epss
scoring_elements 0.59571
published_at 2026-04-04T12:55:00Z
9
value 0.00382
scoring_system epss
scoring_elements 0.5954
published_at 2026-04-07T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.72513
published_at 2026-04-21T12:55:00Z
11
value 0.00757
scoring_system epss
scoring_elements 0.73362
published_at 2026-04-24T12:55:00Z
12
value 0.00757
scoring_system epss
scoring_elements 0.73374
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356042
reference_id 2356042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356042
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44
reference_id GHSA-pcmh-g36c-qc44
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:21:51Z/
url https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.28-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.28-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1734
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqrh-9nue-rqgx
31
url VCID-uush-g6k9-9ffm
vulnerability_id VCID-uush-g6k9-9ffm
summary php: pgsql extension does not check for errors during escaping
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1735
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33221
published_at 2026-04-04T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33187
published_at 2026-04-02T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33052
published_at 2026-04-07T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35211
published_at 2026-04-26T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35522
published_at 2026-04-18T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-21T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35234
published_at 2026-04-24T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35525
published_at 2026-04-08T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35549
published_at 2026-04-09T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35558
published_at 2026-04-11T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-12T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35493
published_at 2026-04-13T12:55:00Z
12
value 0.0015
scoring_system epss
scoring_elements 0.35532
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2378689
reference_id 2378689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2378689
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3
reference_id GHSA-hrwm-9436-5mv3
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:08Z/
url https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
12
reference_url https://usn.ubuntu.com/7648-3/
reference_id USN-7648-3
reference_type
scores
url https://usn.ubuntu.com/7648-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2025-1735
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uush-g6k9-9ffm
32
url VCID-v42g-pabn-yqe7
vulnerability_id VCID-v42g-pabn-yqe7
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
reference_id
reference_type
scores
0
value 0.02395
scoring_system epss
scoring_elements 0.85094
published_at 2026-04-26T12:55:00Z
1
value 0.02395
scoring_system epss
scoring_elements 0.85061
published_at 2026-04-21T12:55:00Z
2
value 0.02395
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-18T12:55:00Z
3
value 0.02395
scoring_system epss
scoring_elements 0.85085
published_at 2026-04-24T12:55:00Z
4
value 0.02395
scoring_system epss
scoring_elements 0.84978
published_at 2026-04-02T12:55:00Z
5
value 0.02395
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-04T12:55:00Z
6
value 0.02395
scoring_system epss
scoring_elements 0.85
published_at 2026-04-07T12:55:00Z
7
value 0.02395
scoring_system epss
scoring_elements 0.85022
published_at 2026-04-08T12:55:00Z
8
value 0.02395
scoring_system epss
scoring_elements 0.85029
published_at 2026-04-09T12:55:00Z
9
value 0.02395
scoring_system epss
scoring_elements 0.85045
published_at 2026-04-11T12:55:00Z
10
value 0.02395
scoring_system epss
scoring_elements 0.85044
published_at 2026-04-12T12:55:00Z
11
value 0.02395
scoring_system epss
scoring_elements 0.8504
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
reference_id 2317049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
reference_id GHSA-9pqp-7h25-4f32
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:56:50Z/
url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.24-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-8925
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v42g-pabn-yqe7
33
url VCID-vfx1-jn3w-1fb9
vulnerability_id VCID-vfx1-jn3w-1fb9
summary php: PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8926.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8926
reference_id
reference_type
scores
0
value 0.02711
scoring_system epss
scoring_elements 0.85951
published_at 2026-04-26T12:55:00Z
1
value 0.02711
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-18T12:55:00Z
2
value 0.02711
scoring_system epss
scoring_elements 0.85921
published_at 2026-04-21T12:55:00Z
3
value 0.02711
scoring_system epss
scoring_elements 0.85942
published_at 2026-04-24T12:55:00Z
4
value 0.02711
scoring_system epss
scoring_elements 0.85851
published_at 2026-04-02T12:55:00Z
5
value 0.02711
scoring_system epss
scoring_elements 0.85868
published_at 2026-04-04T12:55:00Z
6
value 0.02711
scoring_system epss
scoring_elements 0.85872
published_at 2026-04-07T12:55:00Z
7
value 0.02711
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-08T12:55:00Z
8
value 0.02711
scoring_system epss
scoring_elements 0.859
published_at 2026-04-09T12:55:00Z
9
value 0.02711
scoring_system epss
scoring_elements 0.85915
published_at 2026-04-11T12:55:00Z
10
value 0.02711
scoring_system epss
scoring_elements 0.85913
published_at 2026-04-12T12:55:00Z
11
value 0.02711
scoring_system epss
scoring_elements 0.85907
published_at 2026-04-13T12:55:00Z
12
value 0.02711
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8926
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317050
reference_id 2317050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317050
4
reference_url https://github.com/php/php-src/security/advisories/GHSA-p99j-rfp4-xqvq
reference_id GHSA-p99j-rfp4-xqvq
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T12:55:27Z/
url https://github.com/php/php-src/security/advisories/GHSA-p99j-rfp4-xqvq
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.24-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.24-1~deb12u1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-8926
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfx1-jn3w-1fb9
34
url VCID-vz8y-te3y-gqhp
vulnerability_id VCID-vz8y-te3y-gqhp
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0662.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0662
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44424
published_at 2026-04-02T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44301
published_at 2026-04-26T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44422
published_at 2026-04-13T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44479
published_at 2026-04-16T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44469
published_at 2026-04-18T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44399
published_at 2026-04-21T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44297
published_at 2026-04-24T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44446
published_at 2026-04-04T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.4438
published_at 2026-04-07T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44431
published_at 2026-04-08T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44438
published_at 2026-04-09T12:55:00Z
11
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-11T12:55:00Z
12
value 0.00218
scoring_system epss
scoring_elements 0.44423
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
reference_id 1031368
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031368
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2170761
reference_id 2170761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2170761
9
reference_url https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv
reference_id GHSA-54hq-v5wp-fqgv
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:57:39Z/
url https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://security.netapp.com/advisory/ntap-20230517-0001/
reference_id ntap-20230517-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T14:57:39Z/
url https://security.netapp.com/advisory/ntap-20230517-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2023:5926
reference_id RHSA-2023:5926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5926
13
reference_url https://access.redhat.com/errata/RHSA-2023:5927
reference_id RHSA-2023:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5927
14
reference_url https://access.redhat.com/errata/RHSA-2024:0387
reference_id RHSA-2024:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0387
15
reference_url https://usn.ubuntu.com/5902-1/
reference_id USN-5902-1
reference_type
scores
url https://usn.ubuntu.com/5902-1/
16
reference_url https://usn.ubuntu.com/5905-1/
reference_id USN-5905-1
reference_type
scores
url https://usn.ubuntu.com/5905-1/
fixed_packages
0
url pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.4-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.4-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2023-0662
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vz8y-te3y-gqhp
35
url VCID-x2s3-ku1g-gfgh
vulnerability_id VCID-x2s3-ku1g-gfgh
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4577.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4577
reference_id
reference_type
scores
0
value 0.94374
scoring_system epss
scoring_elements 0.99967
published_at 2026-04-24T12:55:00Z
1
value 0.94374
scoring_system epss
scoring_elements 0.99966
published_at 2026-04-18T12:55:00Z
2
value 0.94393
scoring_system epss
scoring_elements 0.99973
published_at 2026-04-26T12:55:00Z
3
value 0.94393
scoring_system epss
scoring_elements 0.99972
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4577
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
4
reference_url https://github.com/rapid7/metasploit-framework/pull/19247
reference_id 19247
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://github.com/rapid7/metasploit-framework/pull/19247
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291281
reference_id 2291281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291281
6
reference_url https://isc.sans.edu/diary/30994
reference_id 30994
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://isc.sans.edu/diary/30994
7
reference_url https://www.php.net/ChangeLog-8.php#8.1.29
reference_id ChangeLog-8.php#8.1.29
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://www.php.net/ChangeLog-8.php#8.1.29
8
reference_url https://www.php.net/ChangeLog-8.php#8.2.20
reference_id ChangeLog-8.php#8.2.20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://www.php.net/ChangeLog-8.php#8.2.20
9
reference_url https://www.php.net/ChangeLog-8.php#8.3.8
reference_id ChangeLog-8.php#8.3.8
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://www.php.net/ChangeLog-8.php#8.3.8
10
reference_url https://github.com/11whoami99/CVE-2024-4577
reference_id CVE-2024-4577
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://github.com/11whoami99/CVE-2024-4577
11
reference_url https://github.com/watchtowrlabs/CVE-2024-4577
reference_id CVE-2024-4577
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://github.com/watchtowrlabs/CVE-2024-4577
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52331.py
reference_id CVE-2024-4577
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52331.py
13
reference_url https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
reference_id CVE-2024-4577-PHP-RCE
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
14
reference_url https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
reference_id cve-2024-4577-yet-another-php-rce.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
15
reference_url https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv
reference_id GHSA-3qgc-jrrr-25jv
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv
16
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
17
reference_url https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/
reference_id imperva-protects-against-critical-php-vulnerability-cve-2024-4577
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/
18
reference_url https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
reference_id no-way-php-strikes-again-cve-2024-4577
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
19
reference_url https://security.netapp.com/advisory/ntap-20240621-0008/
reference_id ntap-20240621-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://security.netapp.com/advisory/ntap-20240621-0008/
20
reference_url https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
reference_id php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
22
reference_url https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
reference_id security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
24
reference_url https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
reference_id warning-php-remote-code-execution-patch-immediately
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-06-15T03:55:28Z/
url https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
fixed_packages
0
url pkg:deb/debian/php8.2@0?distro=bookworm
purl pkg:deb/debian/php8.2@0?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@0%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
aliases CVE-2024-4577
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x2s3-ku1g-gfgh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm