{"url":"http://public2.vulnerablecode.io/api/packages/100329?format=json","purl":"pkg:rpm/redhat/rh-php73-php@7.3.29-1?arch=el7","type":"rpm","namespace":"redhat","name":"rh-php73-php","version":"7.3.29-1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42017?format=json","vulnerability_id":"VCID-2yrz-qpqj-9ugn","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7071.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7071","reference_id":"","reference_type":"","scores":[{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91421","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91509","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91496","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.9147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07003","scoring_system":"epss","scoring_elements":"0.91499","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913846","reference_id":"1913846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913846"},{"reference_url":"https://security.archlinux.org/ASA-202101-9","reference_id":"ASA-202101-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202101-9"},{"reference_url":"https://security.archlinux.org/AVG-1415","reference_id":"AVG-1415","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1415"},{"reference_url":"https://security.gentoo.org/glsa/202105-23","reference_id":"GLSA-202105-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4213","reference_id":"RHSA-2021:4213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4213"},{"reference_url":"https://usn.ubuntu.com/5006-1/","reference_id":"USN-5006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-1/"},{"reference_url":"https://usn.ubuntu.com/5006-2/","reference_id":"USN-5006-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-2/"}],"fixed_packages":[],"aliases":["CVE-2020-7071"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2yrz-qpqj-9ugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42009?format=json","vulnerability_id":"VCID-7mcr-tsd2-tkf2","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7070.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7070","reference_id":"","reference_type":"","scores":[{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96245","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.9626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96277","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26088","scoring_system":"epss","scoring_elements":"0.96298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27653","scoring_system":"epss","scoring_elements":"0.96463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27653","scoring_system":"epss","scoring_elements":"0.96453","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27653","scoring_system":"epss","scoring_elements":"0.96455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27653","scoring_system":"epss","scoring_elements":"0.96456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.29078","scoring_system":"epss","scoring_elements":"0.96595","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885738","reference_id":"1885738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885738"},{"reference_url":"https://security.gentoo.org/glsa/202012-16","reference_id":"GLSA-202012-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4213","reference_id":"RHSA-2021:4213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4213"},{"reference_url":"https://usn.ubuntu.com/4583-1/","reference_id":"USN-4583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4583-1/"},{"reference_url":"https://usn.ubuntu.com/4583-2/","reference_id":"USN-4583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4583-2/"}],"fixed_packages":[],"aliases":["CVE-2020-7070"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7mcr-tsd2-tkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48768?format=json","vulnerability_id":"VCID-99r7-s4va-3kes","summary":"Multiple vulnerabilities have been discovered in PHP, the worst of which could result in local root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21705.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21705","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5263","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52717","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52673","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52772","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52706","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1978755","reference_id":"1978755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1978755"},{"reference_url":"https://security.archlinux.org/ASA-202107-15","reference_id":"ASA-202107-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-15"},{"reference_url":"https://security.archlinux.org/AVG-2132","reference_id":"AVG-2132","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2132"},{"reference_url":"https://security.gentoo.org/glsa/202209-20","reference_id":"GLSA-202209-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1935","reference_id":"RHSA-2022:1935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1935"},{"reference_url":"https://usn.ubuntu.com/5006-1/","reference_id":"USN-5006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-1/"},{"reference_url":"https://usn.ubuntu.com/5006-2/","reference_id":"USN-5006-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-2/"}],"fixed_packages":[],"aliases":["CVE-2021-21705"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-99r7-s4va-3kes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42008?format=json","vulnerability_id":"VCID-araj-st9q-3keq","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7069.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7069.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7069","reference_id":"","reference_type":"","scores":[{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08351","scoring_system":"epss","scoring_elements":"0.92319","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885735","reference_id":"1885735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885735"},{"reference_url":"https://security.gentoo.org/glsa/202012-16","reference_id":"GLSA-202012-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4213","reference_id":"RHSA-2021:4213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4213"},{"reference_url":"https://usn.ubuntu.com/4583-1/","reference_id":"USN-4583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4583-1/"},{"reference_url":"https://usn.ubuntu.com/4583-2/","reference_id":"USN-4583-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4583-2/"}],"fixed_packages":[],"aliases":["CVE-2020-7069"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-araj-st9q-3keq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42019?format=json","vulnerability_id":"VCID-f3vu-gjgg-zbgr","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21702.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21702","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.505","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.506","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50612","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925272","reference_id":"1925272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1925272"},{"reference_url":"https://security.archlinux.org/ASA-202102-15","reference_id":"ASA-202102-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-15"},{"reference_url":"https://security.archlinux.org/AVG-1531","reference_id":"AVG-1531","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1531"},{"reference_url":"https://security.gentoo.org/glsa/202105-23","reference_id":"GLSA-202105-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4213","reference_id":"RHSA-2021:4213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4213"},{"reference_url":"https://usn.ubuntu.com/5006-1/","reference_id":"USN-5006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-1/"},{"reference_url":"https://usn.ubuntu.com/5006-2/","reference_id":"USN-5006-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-2/"}],"fixed_packages":[],"aliases":["CVE-2021-21702"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f3vu-gjgg-zbgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61678?format=json","vulnerability_id":"VCID-w3f2-4edy-zyg4","summary":"A vulnerabilities in PHP could lead to a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7068.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7068","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73982","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73988","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74104","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74105","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868109","reference_id":"1868109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868109"},{"reference_url":"https://security.gentoo.org/glsa/202009-10","reference_id":"GLSA-202009-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202009-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2992","reference_id":"RHSA-2021:2992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4213","reference_id":"RHSA-2021:4213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4213"},{"reference_url":"https://usn.ubuntu.com/5006-1/","reference_id":"USN-5006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-1/"},{"reference_url":"https://usn.ubuntu.com/5006-2/","reference_id":"USN-5006-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5006-2/"}],"fixed_packages":[],"aliases":["CVE-2020-7068"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3f2-4edy-zyg4"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php73-php@7.3.29-1%3Farch=el7"}