{"url":"http://public2.vulnerablecode.io/api/packages/130023?format=json","purl":"pkg:rpm/redhat/php@5.1.4-1.el4s1?arch=4","type":"rpm","namespace":"redhat","name":"php","version":"5.1.4-1.el4s1","qualifiers":{"arch":"4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88844?format=json","vulnerability_id":"VCID-2bcm-xg5v-kyaw","summary":"gd: GIF handling buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484","reference_id":"","reference_type":"","scores":[{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91046","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91101","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06436","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838","reference_id":"384838","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841","reference_id":"384841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568","reference_id":"431568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/342-1/","reference_id":"USN-342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/342-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4484"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60040?format=json","vulnerability_id":"VCID-5f2w-zvqm-mfbe","summary":"PHP is vulnerable to an integer overflow potentially allowing the remote\n    execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4812.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4812","reference_id":"","reference_type":"","scores":[{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.9729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97306","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97309","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39413","scoring_system":"epss","scoring_elements":"0.97315","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4812"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618205","reference_id":"1618205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618205"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/28760.php","reference_id":"CVE-2006-4812;OSVDB-29510","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/28760.php"},{"reference_url":"https://www.securityfocus.com/bid/20349/info","reference_id":"CVE-2006-4812;OSVDB-29510","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/20349/info"},{"reference_url":"https://security.gentoo.org/glsa/200610-14","reference_id":"GLSA-200610-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200610-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0708","reference_id":"RHSA-2006:0708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0708"},{"reference_url":"https://usn.ubuntu.com/362-1/","reference_id":"USN-362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/362-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4812"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5f2w-zvqm-mfbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88835?format=json","vulnerability_id":"VCID-gcsv-9daj-dfc8","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4485.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4485","reference_id":"","reference_type":"","scores":[{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.8251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82646","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4485"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618187","reference_id":"1618187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://usn.ubuntu.com/362-1/","reference_id":"USN-362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/362-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4485"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcsv-9daj-dfc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88834?format=json","vulnerability_id":"VCID-m23p-1fg5-xqe2","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4482.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4482","reference_id":"","reference_type":"","scores":[{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88632","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04104","scoring_system":"epss","scoring_elements":"0.88643","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4482"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618186","reference_id":"1618186","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0682","reference_id":"RHSA-2006:0682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://usn.ubuntu.com/342-1/","reference_id":"USN-342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/342-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4482"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m23p-1fg5-xqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88832?format=json","vulnerability_id":"VCID-nqjb-dpv9-bkex","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4486","reference_id":"","reference_type":"","scores":[{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80895","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.8096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80961","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81017","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4486"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618188","reference_id":"1618188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0682","reference_id":"RHSA-2006:0682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://usn.ubuntu.com/362-1/","reference_id":"USN-362-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/362-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4486"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqjb-dpv9-bkex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48882?format=json","vulnerability_id":"VCID-p819-ynn1-u3ht","summary":"PHP contains a function that, when used, could allow a remote attacker to\n    execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4020","reference_id":"","reference_type":"","scores":[{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.9054","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.9059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0586","scoring_system":"epss","scoring_elements":"0.90599","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618174","reference_id":"1618174","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618174"},{"reference_url":"https://security.gentoo.org/glsa/200608-28","reference_id":"GLSA-200608-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-28"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/2193.php","reference_id":"OSVDB-28000;CVE-2006-4020;OSVDB-27824","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/2193.php"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0669","reference_id":"RHSA-2006:0669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0682","reference_id":"RHSA-2006:0682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0688","reference_id":"RHSA-2006:0688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0736","reference_id":"RHSA-2006:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0736"},{"reference_url":"https://usn.ubuntu.com/342-1/","reference_id":"USN-342-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/342-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4020"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p819-ynn1-u3ht"}],"fixing_vulnerabilities":[],"risk_score":"0.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.4-1.el4s1%3Farch=4"}