Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/php7.4@7.4.33-1%2Bdeb11u5
Typedeb
Namespacedebian
Namephp7.4
Version7.4.33-1+deb11u5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1re1-15w4-cqeq
vulnerability_id VCID-1re1-15w4-cqeq
summary php: Leak partial content of the heap through heap buffer over-read in mysqlnd
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
reference_id
reference_type
scores
0
value 0.00663
scoring_system epss
scoring_elements 0.71263
published_at 2026-04-29T12:55:00Z
1
value 0.00663
scoring_system epss
scoring_elements 0.71169
published_at 2026-04-13T12:55:00Z
2
value 0.00663
scoring_system epss
scoring_elements 0.71215
published_at 2026-04-16T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71221
published_at 2026-04-18T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71253
published_at 2026-04-24T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-26T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71121
published_at 2026-04-07T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.71163
published_at 2026-04-08T12:55:00Z
8
value 0.00663
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-09T12:55:00Z
9
value 0.00663
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-21T12:55:00Z
10
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-12T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71566
published_at 2026-04-02T12:55:00Z
12
value 0.00681
scoring_system epss
scoring_elements 0.71584
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
reference_id 2327960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
reference_id GHSA-h35g-vwh6-m678
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-22T17:37:12Z/
url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-8929
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1re1-15w4-cqeq
1
url VCID-26ab-3bt8-jkf3
vulnerability_id VCID-26ab-3bt8-jkf3
summary php: heap-based buffer overflow in array_merge()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14178
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05863
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-11T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05905
published_at 2026-04-18T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06057
published_at 2026-04-21T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06081
published_at 2026-04-24T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.0611
published_at 2026-04-26T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05896
published_at 2026-04-04T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05889
published_at 2026-04-07T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05927
published_at 2026-04-08T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05966
published_at 2026-04-09T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-12T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05929
published_at 2026-04-13T12:55:00Z
12
value 0.00022
scoring_system epss
scoring_elements 0.05895
published_at 2026-04-16T12:55:00Z
13
value 0.00026
scoring_system epss
scoring_elements 0.07119
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
reference_id 1123574
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123574
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2425625
reference_id 2425625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2425625
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2
reference_id GHSA-h96m-rvf9-jgm2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-29T16:00:50Z/
url https://github.com/php/php-src/security/advisories/GHSA-h96m-rvf9-jgm2
7
reference_url https://access.redhat.com/errata/RHSA-2026:1169
reference_id RHSA-2026:1169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1169
8
reference_url https://access.redhat.com/errata/RHSA-2026:1185
reference_id RHSA-2026:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1185
9
reference_url https://access.redhat.com/errata/RHSA-2026:1187
reference_id RHSA-2026:1187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1187
10
reference_url https://access.redhat.com/errata/RHSA-2026:1190
reference_id RHSA-2026:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1190
11
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
12
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
13
reference_url https://access.redhat.com/errata/RHSA-2026:1429
reference_id RHSA-2026:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1429
14
reference_url https://access.redhat.com/errata/RHSA-2026:1628
reference_id RHSA-2026:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1628
15
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
16
reference_url https://access.redhat.com/errata/RHSA-2026:2799
reference_id RHSA-2026:2799
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2799
17
reference_url https://access.redhat.com/errata/RHSA-2026:4077
reference_id RHSA-2026:4077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4077
18
reference_url https://access.redhat.com/errata/RHSA-2026:4086
reference_id RHSA-2026:4086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4086
19
reference_url https://access.redhat.com/errata/RHSA-2026:4212
reference_id RHSA-2026:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4212
20
reference_url https://access.redhat.com/errata/RHSA-2026:4266
reference_id RHSA-2026:4266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4266
21
reference_url https://access.redhat.com/errata/RHSA-2026:4507
reference_id RHSA-2026:4507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4507
22
reference_url https://access.redhat.com/errata/RHSA-2026:4514
reference_id RHSA-2026:4514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4514
23
reference_url https://access.redhat.com/errata/RHSA-2026:4517
reference_id RHSA-2026:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4517
24
reference_url https://access.redhat.com/errata/RHSA-2026:7614
reference_id RHSA-2026:7614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7614
25
reference_url https://usn.ubuntu.com/7953-1/
reference_id USN-7953-1
reference_type
scores
url https://usn.ubuntu.com/7953-1/
fixed_packages
aliases CVE-2025-14178
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26ab-3bt8-jkf3
2
url VCID-341r-8amt-z7dr
vulnerability_id VCID-341r-8amt-z7dr
summary php: Configuring a proxy in a stream context might allow for CRLF injection in URIs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78595
published_at 2026-04-29T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78514
published_at 2026-04-13T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78539
published_at 2026-04-11T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-12T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78541
published_at 2026-04-18T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.78538
published_at 2026-04-21T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-24T12:55:00Z
7
value 0.01153
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-26T12:55:00Z
8
value 0.01559
scoring_system epss
scoring_elements 0.81462
published_at 2026-04-08T12:55:00Z
9
value 0.01559
scoring_system epss
scoring_elements 0.81434
published_at 2026-04-07T12:55:00Z
10
value 0.02098
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-04T12:55:00Z
11
value 0.02098
scoring_system epss
scoring_elements 0.83996
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
reference_id 2328523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
reference_id GHSA-c5f2-jwm7-mmq2
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:39Z/
url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-11234
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-341r-8amt-z7dr
3
url VCID-53h9-y2ns-jfh1
vulnerability_id VCID-53h9-y2ns-jfh1
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-29T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63662
published_at 2026-04-18T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-21T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63677
published_at 2026-04-26T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63596
published_at 2026-04-02T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63581
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63633
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63649
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-24T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63616
published_at 2026-04-13T12:55:00Z
11
value 0.0045
scoring_system epss
scoring_elements 0.63653
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
reference_id 2317051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
reference_id GHSA-94p6-54jq-9mwp
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:50:40Z/
url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
aliases CVE-2024-8927
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53h9-y2ns-jfh1
4
url VCID-6g29-te13-kucu
vulnerability_id VCID-6g29-te13-kucu
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.75247
published_at 2026-04-29T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75212
published_at 2026-04-18T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75239
published_at 2026-04-24T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-26T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75127
published_at 2026-04-02T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75157
published_at 2026-04-04T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75134
published_at 2026-04-07T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75168
published_at 2026-04-13T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-12T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75202
published_at 2026-04-21T12:55:00Z
10
value 0.00868
scoring_system epss
scoring_elements 0.75206
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
reference_id 2317144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
reference_id GHSA-865w-9rf3-2wh5
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:47:58Z/
url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
fixed_packages
aliases CVE-2024-9026
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g29-te13-kucu
5
url VCID-7151-69v8-cqaj
vulnerability_id VCID-7151-69v8-cqaj
summary php: Integer overflow in the firebird and dblib quoters causing OOB writes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11236
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-11T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.556
published_at 2026-04-02T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-04T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55601
published_at 2026-04-07T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55653
published_at 2026-04-08T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55656
published_at 2026-04-09T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55645
published_at 2026-04-12T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55628
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63387
published_at 2026-04-24T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.634
published_at 2026-04-26T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63383
published_at 2026-04-16T12:55:00Z
11
value 0.00443
scoring_system epss
scoring_elements 0.63391
published_at 2026-04-18T12:55:00Z
12
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-21T12:55:00Z
13
value 0.00443
scoring_system epss
scoring_elements 0.63398
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11236
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11236
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328522
reference_id 2328522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328522
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
reference_id GHSA-5hqh-c84r-qjcv
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-24T12:32:23Z/
url https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
7
reference_url https://usn.ubuntu.com/7153-1/
reference_id USN-7153-1
reference_type
scores
url https://usn.ubuntu.com/7153-1/
8
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
fixed_packages
aliases CVE-2024-11236
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7151-69v8-cqaj
6
url VCID-7qqj-hp6m-z7bh
vulnerability_id VCID-7qqj-hp6m-z7bh
summary php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6491
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45447
published_at 2026-04-04T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45427
published_at 2026-04-02T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.45392
published_at 2026-04-07T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48566
published_at 2026-04-09T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48623
published_at 2026-04-16T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48618
published_at 2026-04-18T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48576
published_at 2026-04-21T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48572
published_at 2026-04-26T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48569
published_at 2026-04-08T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48587
published_at 2026-04-11T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.4856
published_at 2026-04-24T12:55:00Z
11
value 0.00252
scoring_system epss
scoring_elements 0.48573
published_at 2026-04-13T12:55:00Z
12
value 0.00274
scoring_system epss
scoring_elements 0.50713
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2378690
reference_id 2378690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2378690
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
reference_id GHSA-453j-q27h-5p8x
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:59:51Z/
url https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
fixed_packages
aliases CVE-2025-6491
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qqj-hp6m-z7bh
7
url VCID-9byf-ymwr-eug8
vulnerability_id VCID-9byf-ymwr-eug8
summary php: Single byte overread with convert.quoted-printable-decode filter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72714
published_at 2026-04-29T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-21T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72709
published_at 2026-04-24T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-26T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-02T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.726
published_at 2026-04-04T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-07T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-08T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-09T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-11T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-12T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72623
published_at 2026-04-13T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.72665
published_at 2026-04-16T12:55:00Z
13
value 0.00728
scoring_system epss
scoring_elements 0.72676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
reference_id 2328521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
reference_id GHSA-r977-prxv-hc43
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:59Z/
url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-11233
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9byf-ymwr-eug8
8
url VCID-bf18-3zx5-f7gr
vulnerability_id VCID-bf18-3zx5-f7gr
summary php: Header parser of http stream wrapper does not handle folded headers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1217
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2253
published_at 2026-04-04T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22487
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-11T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.2698
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27049
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27094
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27053
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26996
published_at 2026-04-13T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27005
published_at 2026-04-16T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26979
published_at 2026-04-18T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42347
published_at 2026-04-21T12:55:00Z
11
value 0.00213
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-24T12:55:00Z
12
value 0.00213
scoring_system epss
scoring_elements 0.43816
published_at 2026-04-26T12:55:00Z
13
value 0.00213
scoring_system epss
scoring_elements 0.43736
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355917
reference_id 2355917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355917
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g
reference_id GHSA-v8xr-gpvj-cx9g
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/AU:Y/R:A
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:23:16Z/
url https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
aliases CVE-2025-1217
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bf18-3zx5-f7gr
9
url VCID-e16f-4ynx-fqb9
vulnerability_id VCID-e16f-4ynx-fqb9
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
reference_id
reference_type
scores
0
value 0.03579
scoring_system epss
scoring_elements 0.87773
published_at 2026-04-29T12:55:00Z
1
value 0.03579
scoring_system epss
scoring_elements 0.87695
published_at 2026-04-02T12:55:00Z
2
value 0.03579
scoring_system epss
scoring_elements 0.87707
published_at 2026-04-04T12:55:00Z
3
value 0.03579
scoring_system epss
scoring_elements 0.87709
published_at 2026-04-07T12:55:00Z
4
value 0.03579
scoring_system epss
scoring_elements 0.8773
published_at 2026-04-08T12:55:00Z
5
value 0.03579
scoring_system epss
scoring_elements 0.87736
published_at 2026-04-09T12:55:00Z
6
value 0.03579
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-11T12:55:00Z
7
value 0.03579
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-12T12:55:00Z
8
value 0.03579
scoring_system epss
scoring_elements 0.87739
published_at 2026-04-13T12:55:00Z
9
value 0.03579
scoring_system epss
scoring_elements 0.87753
published_at 2026-04-18T12:55:00Z
10
value 0.03579
scoring_system epss
scoring_elements 0.87752
published_at 2026-04-21T12:55:00Z
11
value 0.03579
scoring_system epss
scoring_elements 0.87768
published_at 2026-04-24T12:55:00Z
12
value 0.03579
scoring_system epss
scoring_elements 0.87775
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
reference_id 1072885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
reference_id 2291252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
7
reference_url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
reference_id GHSA-w8qr-v226-r27w
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
8
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
9
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
10
reference_url https://security.netapp.com/advisory/ntap-20240726-0001/
reference_id ntap-20240726-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://security.netapp.com/advisory/ntap-20240726-0001/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
12
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
13
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
14
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
15
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
16
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
17
reference_url https://usn.ubuntu.com/6841-1/
reference_id USN-6841-1
reference_type
scores
url https://usn.ubuntu.com/6841-1/
18
reference_url https://usn.ubuntu.com/6841-2/
reference_id USN-6841-2
reference_type
scores
url https://usn.ubuntu.com/6841-2/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
aliases CVE-2024-5458
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e16f-4ynx-fqb9
10
url VCID-fhh6-shuh-v3am
vulnerability_id VCID-fhh6-shuh-v3am
summary php: potential buffer overflow in php_cli_server_startup_workers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4900
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20282
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20339
published_at 2026-04-04T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20063
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20144
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20202
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20226
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-13T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20116
published_at 2026-04-16T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20121
published_at 2026-04-18T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.2012
published_at 2026-04-21T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20003
published_at 2026-04-24T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.19998
published_at 2026-04-26T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179880
reference_id 2179880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179880
5
reference_url https://access.redhat.com/errata/RHSA-2023:0848
reference_id RHSA-2023:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0848
6
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
7
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
aliases CVE-2022-4900
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhh6-shuh-v3am
11
url VCID-fyhr-st6h-eker
vulnerability_id VCID-fyhr-st6h-eker
summary php: PHP Hostname Null Character Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1220
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.1132
published_at 2026-04-04T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11261
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15356
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.1594
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15741
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15785
published_at 2026-04-21T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15806
published_at 2026-04-24T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15804
published_at 2026-04-26T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15877
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15916
published_at 2026-04-11T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15809
published_at 2026-04-13T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-16T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17152
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379792
reference_id 2379792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379792
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r
reference_id GHSA-3cr5-j632-f35r
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:46Z/
url https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
fixed_packages
aliases CVE-2025-1220
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fyhr-st6h-eker
12
url VCID-nrnn-pgxj-xugg
vulnerability_id VCID-nrnn-pgxj-xugg
summary php: Stream HTTP wrapper truncates redirect location to 1024 bytes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1861
reference_id
reference_type
scores
0
value 0.00705
scoring_system epss
scoring_elements 0.72086
published_at 2026-04-04T12:55:00Z
1
value 0.00705
scoring_system epss
scoring_elements 0.72065
published_at 2026-04-02T12:55:00Z
2
value 0.00935
scoring_system epss
scoring_elements 0.76182
published_at 2026-04-11T12:55:00Z
3
value 0.00935
scoring_system epss
scoring_elements 0.76111
published_at 2026-04-07T12:55:00Z
4
value 0.00935
scoring_system epss
scoring_elements 0.76144
published_at 2026-04-08T12:55:00Z
5
value 0.00935
scoring_system epss
scoring_elements 0.76157
published_at 2026-04-09T12:55:00Z
6
value 0.00935
scoring_system epss
scoring_elements 0.76158
published_at 2026-04-12T12:55:00Z
7
value 0.00935
scoring_system epss
scoring_elements 0.76155
published_at 2026-04-13T12:55:00Z
8
value 0.00935
scoring_system epss
scoring_elements 0.76197
published_at 2026-04-16T12:55:00Z
9
value 0.00935
scoring_system epss
scoring_elements 0.762
published_at 2026-04-18T12:55:00Z
10
value 0.0098
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-21T12:55:00Z
11
value 0.0103
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-24T12:55:00Z
12
value 0.0103
scoring_system epss
scoring_elements 0.77398
published_at 2026-04-26T12:55:00Z
13
value 0.0103
scoring_system epss
scoring_elements 0.77411
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356046
reference_id 2356046
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356046
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff
reference_id GHSA-52jp-hrpf-2jff
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:55:53Z/
url https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
aliases CVE-2025-1861
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnn-pgxj-xugg
13
url VCID-qyx5-b321-2udm
vulnerability_id VCID-qyx5-b321-2udm
summary php: Stream HTTP wrapper header check might omit basic auth header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1736
reference_id
reference_type
scores
0
value 0.00486
scoring_system epss
scoring_elements 0.65377
published_at 2026-04-04T12:55:00Z
1
value 0.00486
scoring_system epss
scoring_elements 0.65351
published_at 2026-04-02T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66802
published_at 2026-04-21T12:55:00Z
3
value 0.00546
scoring_system epss
scoring_elements 0.67883
published_at 2026-04-29T12:55:00Z
4
value 0.00546
scoring_system epss
scoring_elements 0.67868
published_at 2026-04-24T12:55:00Z
5
value 0.00546
scoring_system epss
scoring_elements 0.67878
published_at 2026-04-26T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.70633
published_at 2026-04-07T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70695
published_at 2026-04-09T12:55:00Z
8
value 0.00645
scoring_system epss
scoring_elements 0.70718
published_at 2026-04-11T12:55:00Z
9
value 0.00645
scoring_system epss
scoring_elements 0.70701
published_at 2026-04-12T12:55:00Z
10
value 0.00645
scoring_system epss
scoring_elements 0.70686
published_at 2026-04-13T12:55:00Z
11
value 0.00645
scoring_system epss
scoring_elements 0.70731
published_at 2026-04-16T12:55:00Z
12
value 0.00645
scoring_system epss
scoring_elements 0.70738
published_at 2026-04-18T12:55:00Z
13
value 0.00645
scoring_system epss
scoring_elements 0.70679
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356041
reference_id 2356041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356041
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528
reference_id GHSA-hgf5-96fm-v528
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T12:57:12Z/
url https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
aliases CVE-2025-1736
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx5-b321-2udm
14
url VCID-t862-kese-z7ae
vulnerability_id VCID-t862-kese-z7ae
summary php: libxml streams use wrong content-type header when requesting a redirected resource
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1219
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20677
published_at 2026-04-11T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20522
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20598
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20657
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20635
published_at 2026-04-12T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20583
published_at 2026-04-13T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.2057
published_at 2026-04-16T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20568
published_at 2026-04-18T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20803
published_at 2026-04-04T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25048
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25793
published_at 2026-04-24T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25786
published_at 2026-04-26T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25739
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356043
reference_id 2356043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356043
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc
reference_id GHSA-p3x9-6h7p-cgfc
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:10:21Z/
url https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
fixed_packages
aliases CVE-2025-1219
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t862-kese-z7ae
15
url VCID-ugx8-uqup-n3b4
vulnerability_id VCID-ugx8-uqup-n3b4
summary php: OOB access in ldap_escape
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8932
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.5117
published_at 2026-04-09T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51137
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51161
published_at 2026-04-04T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51118
published_at 2026-04-07T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51173
published_at 2026-04-08T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51214
published_at 2026-04-11T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51192
published_at 2026-04-12T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59274
published_at 2026-04-16T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-24T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59248
published_at 2026-04-29T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59261
published_at 2026-04-26T12:55:00Z
11
value 0.00377
scoring_system epss
scoring_elements 0.5928
published_at 2026-04-18T12:55:00Z
12
value 0.00377
scoring_system epss
scoring_elements 0.59237
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327961
reference_id 2327961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327961
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
reference_id GHSA-g665-fm4p-vhff
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-22T17:41:35Z/
url https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
7
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
8
reference_url https://usn.ubuntu.com/7157-2/
reference_id USN-7157-2
reference_type
scores
url https://usn.ubuntu.com/7157-2/
9
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-8932
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugx8-uqup-n3b4
16
url VCID-uqrh-9nue-rqgx
vulnerability_id VCID-uqrh-9nue-rqgx
summary php: Streams HTTP wrapper does not fail for headers with invalid name and no colon
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1734
reference_id
reference_type
scores
0
value 0.00382
scoring_system epss
scoring_elements 0.59546
published_at 2026-04-02T12:55:00Z
1
value 0.00382
scoring_system epss
scoring_elements 0.59622
published_at 2026-04-11T12:55:00Z
2
value 0.00382
scoring_system epss
scoring_elements 0.5954
published_at 2026-04-07T12:55:00Z
3
value 0.00382
scoring_system epss
scoring_elements 0.59591
published_at 2026-04-08T12:55:00Z
4
value 0.00382
scoring_system epss
scoring_elements 0.59603
published_at 2026-04-09T12:55:00Z
5
value 0.00382
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-12T12:55:00Z
6
value 0.00382
scoring_system epss
scoring_elements 0.59585
published_at 2026-04-13T12:55:00Z
7
value 0.00382
scoring_system epss
scoring_elements 0.59618
published_at 2026-04-16T12:55:00Z
8
value 0.00382
scoring_system epss
scoring_elements 0.59625
published_at 2026-04-18T12:55:00Z
9
value 0.00382
scoring_system epss
scoring_elements 0.59571
published_at 2026-04-04T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.72513
published_at 2026-04-21T12:55:00Z
11
value 0.00757
scoring_system epss
scoring_elements 0.73362
published_at 2026-04-24T12:55:00Z
12
value 0.00757
scoring_system epss
scoring_elements 0.73374
published_at 2026-04-26T12:55:00Z
13
value 0.00757
scoring_system epss
scoring_elements 0.73371
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2356042
reference_id 2356042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2356042
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44
reference_id GHSA-pcmh-g36c-qc44
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:21:51Z/
url https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44
6
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
7
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
8
reference_url https://access.redhat.com/errata/RHSA-2025:7418
reference_id RHSA-2025:7418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7418
9
reference_url https://access.redhat.com/errata/RHSA-2025:7431
reference_id RHSA-2025:7431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7431
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2025:7489
reference_id RHSA-2025:7489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7489
12
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
13
reference_url https://usn.ubuntu.com/7400-1/
reference_id USN-7400-1
reference_type
scores
url https://usn.ubuntu.com/7400-1/
14
reference_url https://usn.ubuntu.com/7645-1/
reference_id USN-7645-1
reference_type
scores
url https://usn.ubuntu.com/7645-1/
fixed_packages
aliases CVE-2025-1734
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqrh-9nue-rqgx
17
url VCID-uush-g6k9-9ffm
vulnerability_id VCID-uush-g6k9-9ffm
summary php: pgsql extension does not check for errors during escaping
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1735
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33221
published_at 2026-04-04T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33187
published_at 2026-04-02T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33052
published_at 2026-04-07T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35558
published_at 2026-04-11T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35522
published_at 2026-04-18T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-21T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35234
published_at 2026-04-24T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35211
published_at 2026-04-26T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35525
published_at 2026-04-08T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35549
published_at 2026-04-09T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-12T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35493
published_at 2026-04-13T12:55:00Z
12
value 0.0015
scoring_system epss
scoring_elements 0.35532
published_at 2026-04-16T12:55:00Z
13
value 0.00162
scoring_system epss
scoring_elements 0.36743
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2378689
reference_id 2378689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2378689
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3
reference_id GHSA-hrwm-9436-5mv3
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T15:58:08Z/
url https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3
6
reference_url https://access.redhat.com/errata/RHSA-2025:23309
reference_id RHSA-2025:23309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23309
7
reference_url https://access.redhat.com/errata/RHSA-2026:1409
reference_id RHSA-2026:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1409
8
reference_url https://access.redhat.com/errata/RHSA-2026:1412
reference_id RHSA-2026:1412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1412
9
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
10
reference_url https://usn.ubuntu.com/7648-1/
reference_id USN-7648-1
reference_type
scores
url https://usn.ubuntu.com/7648-1/
11
reference_url https://usn.ubuntu.com/7648-2/
reference_id USN-7648-2
reference_type
scores
url https://usn.ubuntu.com/7648-2/
12
reference_url https://usn.ubuntu.com/7648-3/
reference_id USN-7648-3
reference_type
scores
url https://usn.ubuntu.com/7648-3/
fixed_packages
aliases CVE-2025-1735
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uush-g6k9-9ffm
18
url VCID-v42g-pabn-yqe7
vulnerability_id VCID-v42g-pabn-yqe7
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
reference_id
reference_type
scores
0
value 0.02395
scoring_system epss
scoring_elements 0.85092
published_at 2026-04-29T12:55:00Z
1
value 0.02395
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-18T12:55:00Z
2
value 0.02395
scoring_system epss
scoring_elements 0.85085
published_at 2026-04-24T12:55:00Z
3
value 0.02395
scoring_system epss
scoring_elements 0.85094
published_at 2026-04-26T12:55:00Z
4
value 0.02395
scoring_system epss
scoring_elements 0.84978
published_at 2026-04-02T12:55:00Z
5
value 0.02395
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-04T12:55:00Z
6
value 0.02395
scoring_system epss
scoring_elements 0.85
published_at 2026-04-07T12:55:00Z
7
value 0.02395
scoring_system epss
scoring_elements 0.85022
published_at 2026-04-08T12:55:00Z
8
value 0.02395
scoring_system epss
scoring_elements 0.85029
published_at 2026-04-09T12:55:00Z
9
value 0.02395
scoring_system epss
scoring_elements 0.85045
published_at 2026-04-11T12:55:00Z
10
value 0.02395
scoring_system epss
scoring_elements 0.85044
published_at 2026-04-12T12:55:00Z
11
value 0.02395
scoring_system epss
scoring_elements 0.8504
published_at 2026-04-13T12:55:00Z
12
value 0.02395
scoring_system epss
scoring_elements 0.85061
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
reference_id 2317049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
reference_id GHSA-9pqp-7h25-4f32
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:56:50Z/
url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
aliases CVE-2024-8925
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v42g-pabn-yqe7
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/php7.4@7.4.33-1%252Bdeb11u5