{"url":"http://public2.vulnerablecode.io/api/packages/129669?format=json","purl":"pkg:rpm/redhat/php@4.3.9-3.22?arch=9","type":"rpm","namespace":"redhat","name":"php","version":"4.3.9-3.22","qualifiers":{"arch":"9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42239?format=json","vulnerability_id":"VCID-12my-dqjx-sbdg","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3998","reference_id":"","reference_type":"","scores":[{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.9114","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91149","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.9116","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3998"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276081","reference_id":"276081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276081"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3998"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12my-dqjx-sbdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88695?format=json","vulnerability_id":"VCID-ggr6-gare-nfca","summary":"php cross-site cookie insertion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3799.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3799","reference_id":"","reference_type":"","scores":[{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.9272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92726","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92761","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92773","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92778","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92784","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09249","scoring_system":"epss","scoring_elements":"0.92808","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=250726","reference_id":"250726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=250726"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30130.txt","reference_id":"CVE-2007-3799;OSVDB-36855","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30130.txt"},{"reference_url":"https://www.securityfocus.com/bid/24268/info","reference_id":"CVE-2007-3799;OSVDB-36855","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24268/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3799"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggr6-gare-nfca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42248?format=json","vulnerability_id":"VCID-pcat-nj9b-t3au","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4658","reference_id":"","reference_type":"","scores":[{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.8732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87383","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87378","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88473","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.8852","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88559","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4658"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278011","reference_id":"278011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278011"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4658"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcat-nj9b-t3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42237?format=json","vulnerability_id":"VCID-svg5-jd8s-mbb5","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996","reference_id":"","reference_type":"","scores":[{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13543","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94638","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94644","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94649","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94663","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031","reference_id":"278031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456","reference_id":"443456","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/557-1/","reference_id":"USN-557-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/557-1/"},{"reference_url":"https://usn.ubuntu.com/720-1/","reference_id":"USN-720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/720-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3996"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42231?format=json","vulnerability_id":"VCID-t6ww-kp28-dfgj","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"},{"reference_url":"http://osvdb.org/36083","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36083"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2872","reference_id":"","reference_type":"","scores":[{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.9561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95676","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.9598","published_at":"2026-05-11T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95985","published_at":"2026-05-12T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95997","published_at":"2026-05-14T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95973","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95977","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2872"},{"reference_url":"http://secunia.com/advisories/25456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25456"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26838"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27351","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27351"},{"reference_url":"http://secunia.com/advisories/27377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27377"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/27864","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27864"},{"reference_url":"http://secunia.com/advisories/28318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28318"},{"reference_url":"http://secunia.com/advisories/28658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28658"},{"reference_url":"http://secunia.com/advisories/28750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28750"},{"reference_url":"http://secunia.com/advisories/28936","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28936"},{"reference_url":"http://secunia.com/advisories/30040","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30040"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39398","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39398"},{"reference_url":"https://issues.rpath.com/browse/RPL-1693","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1693"},{"reference_url":"https://issues.rpath.com/browse/RPL-1702","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1702"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"},{"reference_url":"https://launchpad.net/bugs/173043","reference_id":"","reference_type":"","scores":[],"url":"https://launchpad.net/bugs/173043"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/ChangeLog-4.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-4.php"},{"reference_url":"http://www.php.net/releases/4_4_8.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/4_4_8.php"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0888.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0888.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.sec-consult.com/291.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sec-consult.com/291.html"},{"reference_url":"http://www.securityfocus.com/archive/1/470244/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/470244/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24261"},{"reference_url":"http://www.securitytracker.com/id?1018186","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018186"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-549-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-549-2"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2061","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2061"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0059","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0059"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0398","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0398"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242032","reference_id":"242032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242032"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2872","reference_id":"CVE-2007-2872","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2872"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php","reference_id":"CVE-2007-2872;OSVDB-36083","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php"},{"reference_url":"https://www.securityfocus.com/bid/24261/info","reference_id":"CVE-2007-2872;OSVDB-36083","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24261/info"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2872"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ww-kp28-dfgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=json","vulnerability_id":"VCID-tttf-2akk-57ez","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"http://bugs.libgd.org/?do=details&task_id=86","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://osvdb.org/35788","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/35788"},{"reference_url":"http://osvdb.org/36643","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36643"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756","reference_id":"","reference_type":"","scores":[{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91432","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91413","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25362","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25362"},{"reference_url":"http://secunia.com/advisories/25378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25378"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/25590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25590"},{"reference_url":"http://secunia.com/advisories/25646","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25646"},{"reference_url":"http://secunia.com/advisories/25657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25657"},{"reference_url":"http://secunia.com/advisories/25658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25658"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"reference_url":"https://issues.rpath.com/browse/RPL-1394","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1394"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/bid/24089","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24089"},{"reference_url":"http://www.securitytracker.com/id?1018187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018187"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1904","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1905","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033","reference_id":"242033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584","reference_id":"425584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100","reference_id":"426100","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756","reference_id":"CVE-2007-2756","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2756"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42254?format=json","vulnerability_id":"VCID-z18y-5z5q-4yff","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4670","reference_id":"","reference_type":"","scores":[{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87052","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87067","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87095","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87716","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.8774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87769","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.8778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87773","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4670"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278041","reference_id":"278041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278041"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4670"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z18y-5z5q-4yff"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@4.3.9-3.22%3Farch=9"}