{"url":"http://public2.vulnerablecode.io/api/packages/129314?format=json","purl":"pkg:rpm/redhat/php@5.1.6-20.el5_2?arch=1","type":"rpm","namespace":"redhat","name":"php","version":"5.1.6-20.el5_2","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42188?format=json","vulnerability_id":"VCID-3shx-e17g-suat","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2107.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2107.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2107","reference_id":"","reference_type":"","scores":[{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86752","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.8677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86793","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86804","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03088","scoring_system":"epss","scoring_elements":"0.86849","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2107"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445684","reference_id":"445684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445684"},{"reference_url":"https://security.gentoo.org/glsa/200811-05","reference_id":"GLSA-200811-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200811-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2008-2107"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3shx-e17g-suat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88606?format=json","vulnerability_id":"VCID-4ndg-j6a7-qfej","summary":"php session ID leakage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5899.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5899.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5899","reference_id":"","reference_type":"","scores":[{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82274","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82378","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82381","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01712","scoring_system":"epss","scoring_elements":"0.82436","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5899"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=382431","reference_id":"382431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=382431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5899"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ndg-j6a7-qfej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42256?format=json","vulnerability_id":"VCID-68jr-29vx-k3d1","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4782","reference_id":"","reference_type":"","scores":[{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87192","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87202","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87215","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4782"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=285881","reference_id":"285881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=285881"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4782"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68jr-29vx-k3d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42186?format=json","vulnerability_id":"VCID-cthn-r5ae-qucm","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2051.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2051","reference_id":"","reference_type":"","scores":[{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91042","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91077","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.9113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91125","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06485","scoring_system":"epss","scoring_elements":"0.91139","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2051"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445006","reference_id":"445006","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445006"},{"reference_url":"https://security.gentoo.org/glsa/200811-05","reference_id":"GLSA-200811-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200811-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2008-2051"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cthn-r5ae-qucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42189?format=json","vulnerability_id":"VCID-f9wq-evsy-4qc8","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2108.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2108","reference_id":"","reference_type":"","scores":[{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90279","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.9035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05607","scoring_system":"epss","scoring_elements":"0.90359","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445685","reference_id":"445685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445685"},{"reference_url":"https://security.gentoo.org/glsa/200811-05","reference_id":"GLSA-200811-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200811-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2008-2108"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9wq-evsy-4qc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88605?format=json","vulnerability_id":"VCID-mpxy-ymd4-fueu","summary":"php htmlentities/htmlspecialchars multibyte sequences","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5898.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5898","reference_id":"","reference_type":"","scores":[{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90854","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90892","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.9089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90926","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90925","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06231","scoring_system":"epss","scoring_elements":"0.90938","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=382411","reference_id":"382411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=382411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0546","reference_id":"RHSA-2008:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[],"aliases":["CVE-2007-5898"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mpxy-ymd4-fueu"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.6-20.el5_2%3Farch=1"}