Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-74de-hcuq-5fdu
Summary
A vulnerability in PHP might allow an attacker to execute arbitrary
    code.
Aliases
0
alias CVE-2019-11043
Fixed_packages
0
url pkg:alpm/archlinux/php@7.3.11-1
purl pkg:alpm/archlinux/php@7.3.11-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.11-1
1
url pkg:apk/alpine/php7@7.1.33-r0?arch=aarch64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=aarch64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=aarch64&distroversion=v3.7&reponame=community
2
url pkg:apk/alpine/php7@7.1.33-r0?arch=armhf&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=armhf&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=armhf&distroversion=v3.7&reponame=community
3
url pkg:apk/alpine/php7@7.1.33-r0?arch=ppc64le&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=ppc64le&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=ppc64le&distroversion=v3.7&reponame=community
4
url pkg:apk/alpine/php7@7.1.33-r0?arch=s390x&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=s390x&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=s390x&distroversion=v3.7&reponame=community
5
url pkg:apk/alpine/php7@7.1.33-r0?arch=x86&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=x86&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86&distroversion=v3.7&reponame=community
6
url pkg:apk/alpine/php7@7.1.33-r0?arch=x86_64&distroversion=v3.7&reponame=community
purl pkg:apk/alpine/php7@7.1.33-r0?arch=x86_64&distroversion=v3.7&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86_64&distroversion=v3.7&reponame=community
7
url pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.9&reponame=community
8
url pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.9&reponame=community
9
url pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.8&reponame=community
10
url pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.8&reponame=community
11
url pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.8&reponame=community
12
url pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.8&reponame=community
13
url pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.8&reponame=community
14
url pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.8&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.8&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.8&reponame=community
15
url pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.9&reponame=community
16
url pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.9&reponame=community
17
url pkg:apk/alpine/php7@7.2.24-r0?arch=armv7&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=armv7&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armv7&distroversion=v3.9&reponame=community
18
url pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.9&reponame=community
19
url pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.9&reponame=community
purl pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.9&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.9&reponame=community
20
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
21
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.14&reponame=community
22
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.15&reponame=community
23
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.11&reponame=community
24
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.11&reponame=community
25
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
26
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.14&reponame=community
27
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.10&reponame=community
28
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.10&reponame=community
29
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.13&reponame=community
30
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.13&reponame=community
31
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.13&reponame=community
32
url pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.13&reponame=community
33
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community
34
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.13&reponame=community
35
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.13&reponame=community
36
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.13&reponame=community
37
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.14&reponame=community
38
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.14&reponame=community
39
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community
40
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.14&reponame=community
41
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.14&reponame=community
42
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.10&reponame=community
43
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.10&reponame=community
44
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.10&reponame=community
45
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.10&reponame=community
46
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.10&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.10&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.10&reponame=community
47
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.12&reponame=community
48
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.12&reponame=community
49
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.12&reponame=community
50
url pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.12&reponame=community
51
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
52
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.12&reponame=community
53
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.12&reponame=community
54
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.12&reponame=community
55
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.15&reponame=community
56
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community
57
url pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.15&reponame=community
58
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.15&reponame=community
59
url pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.11&reponame=community
60
url pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.11&reponame=community
61
url pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.11&reponame=community
62
url pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.11&reponame=community
63
url pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.11&reponame=community
purl pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.11&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.11&reponame=community
64
url pkg:ebuild/dev-lang/php@5.6.40-r7
purl pkg:ebuild/dev-lang/php@5.6.40-r7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.40-r7
65
url pkg:ebuild/dev-lang/php@7.1.33
purl pkg:ebuild/dev-lang/php@7.1.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.1.33
66
url pkg:ebuild/dev-lang/php@7.2.24
purl pkg:ebuild/dev-lang/php@7.2.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.24
67
url pkg:ebuild/dev-lang/php@7.3.11
purl pkg:ebuild/dev-lang/php@7.3.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.11
Affected_packages
0
url pkg:alpm/archlinux/php@7.3.10-1
purl pkg:alpm/archlinux/php@7.3.10-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.10-1
1
url pkg:rpm/redhat/php@5.3.3-50?arch=el6_10
purl pkg:rpm/redhat/php@5.3.3-50?arch=el6_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.3.3-50%3Farch=el6_10
2
url pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_7
purl pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_7
3
url pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_6
purl pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_6
4
url pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el7
purl pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el7
5
url pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el6
purl pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el6
6
url pkg:rpm/redhat/rh-php71-php@7.1.30-2?arch=el7
purl pkg:rpm/redhat/rh-php71-php@7.1.30-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-74de-hcuq-5fdu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php71-php@7.1.30-2%3Farch=el7
7
url pkg:rpm/redhat/rh-php72-php@7.2.24-1?arch=el7
purl pkg:rpm/redhat/rh-php72-php@7.2.24-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ap1-zugk-gbas
1
vulnerability VCID-2frx-71st-5qar
2
vulnerability VCID-4gxr-wh6g-bbbe
3
vulnerability VCID-6157-dume-sbcy
4
vulnerability VCID-6xda-97rd-9bam
5
vulnerability VCID-74de-hcuq-5fdu
6
vulnerability VCID-8kme-kjne-xubq
7
vulnerability VCID-aphr-wqxe-h3du
8
vulnerability VCID-c73c-1vw2-nfdf
9
vulnerability VCID-dhmd-y13e-t7hm
10
vulnerability VCID-g1b8-dkd3-j3a2
11
vulnerability VCID-nnxq-za85-73dk
12
vulnerability VCID-pn3v-35ge-fqa6
13
vulnerability VCID-qwh1-37ux-73h8
14
vulnerability VCID-rjc8-9tfv-sfdk
15
vulnerability VCID-sszm-mvm2-m7ee
16
vulnerability VCID-utwt-7gge-j7c7
17
vulnerability VCID-vh94-jp2p-zygp
18
vulnerability VCID-vtnn-62dq-yuee
19
vulnerability VCID-xg9z-qzsv-c7a6
20
vulnerability VCID-y1mr-3hx7-mfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php72-php@7.2.24-1%3Farch=el7
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html
2
reference_url http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11043
reference_id
reference_type
scores
0
value 0.94053
scoring_system epss
scoring_elements 0.99901
published_at 2026-04-12T12:55:00Z
1
value 0.94053
scoring_system epss
scoring_elements 0.99902
published_at 2026-04-18T12:55:00Z
2
value 0.94062
scoring_system epss
scoring_elements 0.99901
published_at 2026-04-01T12:55:00Z
3
value 0.94062
scoring_system epss
scoring_elements 0.99902
published_at 2026-04-04T12:55:00Z
4
value 0.94062
scoring_system epss
scoring_elements 0.99904
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11043
5
reference_url https://bugs.php.net/bug.php?id=78599
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://bugs.php.net/bug.php?id=78599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043
7
reference_url http://seclists.org/fulldisclosure/2020/Jan/40
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url http://seclists.org/fulldisclosure/2020/Jan/40
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://github.com/neex/phuip-fpizdam
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://github.com/neex/phuip-fpizdam
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/
13
reference_url https://seclists.org/bugtraq/2020/Jan/44
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://seclists.org/bugtraq/2020/Jan/44
14
reference_url https://security.netapp.com/advisory/ntap-20191031-0003/
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://security.netapp.com/advisory/ntap-20191031-0003/
15
reference_url https://support.apple.com/kb/HT210919
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://support.apple.com/kb/HT210919
16
reference_url https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS
17
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043
18
reference_url https://www.debian.org/security/2019/dsa-4552
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://www.debian.org/security/2019/dsa-4552
19
reference_url https://www.debian.org/security/2019/dsa-4553
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://www.debian.org/security/2019/dsa-4553
20
reference_url https://www.synology.com/security/advisory/Synology_SA_19_36
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://www.synology.com/security/advisory/Synology_SA_19_36
21
reference_url https://www.tenable.com/security/tns-2021-14
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://www.tenable.com/security/tns-2021-14
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1766378
reference_id 1766378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1766378
23
reference_url https://security.archlinux.org/ASA-201910-14
reference_id ASA-201910-14
reference_type
scores
url https://security.archlinux.org/ASA-201910-14
24
reference_url https://security.archlinux.org/AVG-1052
reference_id AVG-1052
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1052
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
89
reference_url https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f
reference_id CVE-2019-11043
reference_type exploit
scores
url https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f
90
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb
reference_id CVE-2019-11043
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md
reference_id CVE-2019-11043
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md
92
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-11043
reference_id CVE-2019-11043
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-11043
93
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb
reference_id CVE-2019-11043
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb
94
reference_url https://security.gentoo.org/glsa/201910-01
reference_id GLSA-201910-01
reference_type
scores
url https://security.gentoo.org/glsa/201910-01
95
reference_url https://access.redhat.com/errata/RHSA-2019:3286
reference_id RHSA-2019:3286
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3286
96
reference_url https://access.redhat.com/errata/RHSA-2019:3287
reference_id RHSA-2019:3287
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3287
97
reference_url https://access.redhat.com/errata/RHSA-2019:3299
reference_id RHSA-2019:3299
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3299
98
reference_url https://access.redhat.com/errata/RHSA-2019:3300
reference_id RHSA-2019:3300
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3300
99
reference_url https://access.redhat.com/errata/RHSA-2019:3724
reference_id RHSA-2019:3724
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3724
100
reference_url https://access.redhat.com/errata/RHSA-2019:3735
reference_id RHSA-2019:3735
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3735
101
reference_url https://access.redhat.com/errata/RHSA-2019:3736
reference_id RHSA-2019:3736
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:3736
102
reference_url https://access.redhat.com/errata/RHSA-2020:0322
reference_id RHSA-2020:0322
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://access.redhat.com/errata/RHSA-2020:0322
103
reference_url https://access.redhat.com/errata/RHSA-2020:2835
reference_id RHSA-2020:2835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2835
104
reference_url https://usn.ubuntu.com/4166-1/
reference_id USN-4166-1
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://usn.ubuntu.com/4166-1/
105
reference_url https://usn.ubuntu.com/4166-2/
reference_id USN-4166-2
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/
url https://usn.ubuntu.com/4166-2/
Weaknesses
0
cwe_id 787
name Out-of-bounds Write
description The product writes data past the end, or before the beginning, of the intended buffer.
1
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Exploits
0
date_added null
description
This module exploits an underflow vulnerability in versions 7.1.x
          below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 of PHP-FPM on
          Nginx. Only servers with certains Nginx + PHP-FPM configurations are
          exploitable. This is a port of the original neex's exploit code (see
          refs.). First, it detects the correct parameters (Query String Length
          and custom header length) needed to trigger code execution. This step
          determines if the target is actually vulnerable (Check method). Then,
          the exploit sets a series of PHP INI directives to create a file
          locally on the target, which enables code execution through a query
          string parameter. This is used to execute normal payload stagers.
          Finally, this module does some cleanup by killing local PHP-FPM
          workers (those are spawned automatically once killed) and removing
          the created local file.
required_action null
due_date null
notes
Stability:
  - crash-service-restarts
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - ioc-in-logs
known_ransomware_campaign_use false
source_date_published 2019-10-22
exploit_type null
platform PHP,Unix
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/php_fpm_rce.rb
1
date_added 2022-03-25
description In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.
required_action Apply updates per vendor instructions.
due_date 2022-04-15
notes https://nvd.nist.gov/vuln/detail/CVE-2019-11043
known_ransomware_campaign_use true
source_date_published null
exploit_type null
platform null
source_date_updated null
data_source KEV
source_url null
2
date_added 2019-10-28
description PHP-FPM + Nginx - Remote Code Execution
required_action null
due_date null
notes null
known_ransomware_campaign_use false
source_date_published 2019-10-28
exploit_type webapps
platform php
source_date_updated 2019-10-28
data_source Exploit-DB
source_url https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f
Severity_range_score7.5 - 10.0
Exploitability2.0
Weighted_severity9.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-74de-hcuq-5fdu