Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-age2-x97h-m3bk |
| Summary | Multiple vulnerabilities were found in PHP, the worst of which lead
to remote execution of arbitrary code. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99411 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99413 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99416 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99417 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99418 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.99421 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.86573 |
| scoring_system |
epss |
| scoring_elements |
0.9942 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4885 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| Weaknesses |
|
| Exploits |
| 0 |
| date_added |
null |
| description |
This module uses a denial-of-service (DoS) condition appearing in a variety of
programming languages. This vulnerability occurs when storing multiple values
in a hash table and all values have the same hash value. This can cause a web server
parsing the POST parameters issued with a request into a hash table to consume
hours of CPU with a single HTTP request.
Currently, only the hash functions for PHP and Java are implemented.
This module was tested with PHP + httpd, Tomcat, Glassfish and Geronimo.
It also generates a random payload to bypass some IDS signatures. |
| required_action |
null |
| due_date |
null |
| notes |
Stability:
- crash-service-down
SideEffects: []
Reliability: []
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2011-12-28 |
| exploit_type |
null |
| platform |
|
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/hashcollision_dos.rb |
|
| 1 |
| date_added |
2006-07-14 |
| description |
MyBulletinBoard (MyBB) 1.1.5 - 'CLIENT-IP' SQL Injection |
| required_action |
null |
| due_date |
null |
| notes |
null |
| known_ransomware_campaign_use |
true |
| source_date_published |
2006-07-15 |
| exploit_type |
webapps |
| platform |
php |
| source_date_updated |
2016-11-09 |
| data_source |
Exploit-DB |
| source_url |
|
|
|
| Severity_range_score | null |
| Exploitability | 2.0 |
| Weighted_severity | 0.8 |
| Risk_score | 1.6 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-age2-x97h-m3bk |