{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","type":"ebuild","namespace":"dev-lang","name":"php","version":"5.2.4_p20070914-r2","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.2.6-r6","latest_non_vulnerable_version":"8.3.12","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42239?format=json","vulnerability_id":"VCID-12my-dqjx-sbdg","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3998","reference_id":"","reference_type":"","scores":[{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05887","scoring_system":"epss","scoring_elements":"0.90596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.9114","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.91149","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06447","scoring_system":"epss","scoring_elements":"0.9116","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3998"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276081","reference_id":"276081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276081"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3998"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12my-dqjx-sbdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42252?format=json","vulnerability_id":"VCID-3aaa-rnq9-t7bg","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4662","reference_id":"","reference_type":"","scores":[{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.88974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.88982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.88999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89036","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89029","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89043","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0442","scoring_system":"epss","scoring_elements":"0.89037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.89999","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.89998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.89997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.9001","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.90024","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.90036","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.90032","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.9004","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0524","scoring_system":"epss","scoring_elements":"0.90054","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4662"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278101","reference_id":"278101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278101"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4662"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3aaa-rnq9-t7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42228?format=json","vulnerability_id":"VCID-4umw-u24s-mud8","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1887.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1887","reference_id":"","reference_type":"","scores":[{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89107","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.88963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.88987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.88989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.8905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89086","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89082","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0441","scoring_system":"epss","scoring_elements":"0.89091","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1887"},{"reference_url":"http://secunia.com/advisories/24909","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24909"},{"reference_url":"http://secunia.com/advisories/25057","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25057"},{"reference_url":"http://secunia.com/advisories/25062","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25062"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33766","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33766"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5348","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5348"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.debian.org/security/2007/dsa-1283","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1283"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:088","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:089","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"},{"reference_url":"http://www.php.net/releases/5_2_1.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_1.php"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.php-security.org/MOPB/MOPB-41-2007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.php-security.org/MOPB/MOPB-41-2007.html"},{"reference_url":"http://www.securityfocus.com/bid/23235","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23235"},{"reference_url":"http://www.ubuntu.com/usn/usn-455-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-455-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1887","reference_id":"CVE-2007-1887","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1887"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/455-1/","reference_id":"USN-455-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/455-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-1887"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4umw-u24s-mud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42256?format=json","vulnerability_id":"VCID-68jr-29vx-k3d1","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4782","reference_id":"","reference_type":"","scores":[{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.8645","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.8647","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86466","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86479","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02911","scoring_system":"epss","scoring_elements":"0.86516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87197","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87215","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87202","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03282","scoring_system":"epss","scoring_elements":"0.87192","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4782"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=285881","reference_id":"285881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=285881"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0544","reference_id":"RHSA-2008:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0545","reference_id":"RHSA-2008:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0582","reference_id":"RHSA-2008:0582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0582"},{"reference_url":"https://usn.ubuntu.com/628-1/","reference_id":"USN-628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/628-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4782"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68jr-29vx-k3d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42262?format=json","vulnerability_id":"VCID-9tjq-wrg8-7bfw","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4840","reference_id":"","reference_type":"","scores":[{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80602","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80621","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80616","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80633","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81654","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4840"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tjq-wrg8-7bfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42233?format=json","vulnerability_id":"VCID-dqky-4tkk-1uh8","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.php.net/bug.php?id=41492","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.php.net/bug.php?id=41492"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://osvdb.org/36084","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36084"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3007.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3007","reference_id":"","reference_type":"","scores":[{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78747","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78589","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78588","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78658","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78682","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78697","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78692","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01156","scoring_system":"epss","scoring_elements":"0.78708","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3007"},{"reference_url":"http://secunia.com/advisories/25456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25456"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.securityfocus.com/bid/24259","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24259"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3007","reference_id":"CVE-2007-3007","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3007"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3007"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqky-4tkk-1uh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42250?format=json","vulnerability_id":"VCID-j7ta-nw6z-e7d9","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4660","reference_id":"","reference_type":"","scores":[{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90055","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.9006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.9009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90088","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90082","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0536","scoring_system":"epss","scoring_elements":"0.90097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91019","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91034","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91062","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91069","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06338","scoring_system":"epss","scoring_elements":"0.91079","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278161","reference_id":"278161","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278161"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4660"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7ta-nw6z-e7d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42261?format=json","vulnerability_id":"VCID-jjns-fjap-kudd","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4825.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4825","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50891","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50942","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50972","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50929","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50959","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51036","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54376","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5439","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5438","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4825"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=287971","reference_id":"287971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=287971"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4825"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jjns-fjap-kudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42258?format=json","vulnerability_id":"VCID-jugt-sr4b-33gf","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4783.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4783","reference_id":"","reference_type":"","scores":[{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.8072","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0142","scoring_system":"epss","scoring_elements":"0.80782","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81807","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.8168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01606","scoring_system":"epss","scoring_elements":"0.81751","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4783"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=285891","reference_id":"285891","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=285891"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4783"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jugt-sr4b-33gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42249?format=json","vulnerability_id":"VCID-jvht-mr6w-w7eg","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4659","reference_id":"","reference_type":"","scores":[{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.8872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04193","scoring_system":"epss","scoring_elements":"0.88736","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89711","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89737","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89744","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89754","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04973","scoring_system":"epss","scoring_elements":"0.89773","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=276531","reference_id":"276531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=276531"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4659"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvht-mr6w-w7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42247?format=json","vulnerability_id":"VCID-nafj-5za7-t7f7","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4657","reference_id":"","reference_type":"","scores":[{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.8414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.8413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02117","scoring_system":"epss","scoring_elements":"0.84158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86914","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.8692","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86945","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86981","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86976","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.86989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03135","scoring_system":"epss","scoring_elements":"0.87018","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4657"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278061","reference_id":"278061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278061"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4657"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nafj-5za7-t7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42253?format=json","vulnerability_id":"VCID-nx18-7bt6-nqhm","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4663.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4663","reference_id":"","reference_type":"","scores":[{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.8063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80661","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82421","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82443","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82457","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01705","scoring_system":"epss","scoring_elements":"0.82497","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4663"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277991","reference_id":"277991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277991"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4663"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nx18-7bt6-nqhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42248?format=json","vulnerability_id":"VCID-pcat-nj9b-t3au","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4658","reference_id":"","reference_type":"","scores":[{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.8732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87383","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87378","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03375","scoring_system":"epss","scoring_elements":"0.87386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88473","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.8852","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88518","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04012","scoring_system":"epss","scoring_elements":"0.88559","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4658"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278011","reference_id":"278011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278011"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4658"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcat-nj9b-t3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42251?format=json","vulnerability_id":"VCID-pgs1-b1fw-1bat","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4661","reference_id":"","reference_type":"","scores":[{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.8821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03881","scoring_system":"epss","scoring_elements":"0.88258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.8928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89285","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89289","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89298","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89316","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89356","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278161","reference_id":"278161","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278161"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4661"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pgs1-b1fw-1bat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42227?format=json","vulnerability_id":"VCID-quju-nc1a-kqf9","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1883.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1883","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66419","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66255","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66266","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66325","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66368","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.6634","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.6636","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1883"},{"reference_url":"http://secunia.com/advisories/24542","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24542"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33750","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33750"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.php-security.org/MOPB/MOPB-37-2007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.php-security.org/MOPB/MOPB-37-2007.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1883","reference_id":"CVE-2007-1883","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1883"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-1883"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-quju-nc1a-kqf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42229?format=json","vulnerability_id":"VCID-qzv8-12fu-9ba4","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1900.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1900","reference_id":"","reference_type":"","scores":[{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74477","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74432","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.7442","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75428","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75341","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75471","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75476","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75344","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75376","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1900"},{"reference_url":"http://secunia.com/advisories/24824","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24824"},{"reference_url":"http://secunia.com/advisories/25056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25056"},{"reference_url":"http://secunia.com/advisories/25057","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25057"},{"reference_url":"http://secunia.com/advisories/25062","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25062"},{"reference_url":"http://secunia.com/advisories/25445","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25445"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33510","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33510"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.debian.org/security/2007/dsa-1283","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1283"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_32_php.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_32_php.html"},{"reference_url":"http://www.osvdb.org/33962","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/33962"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.php-security.org/MOPB/PMOPB-45-2007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.php-security.org/MOPB/PMOPB-45-2007.html"},{"reference_url":"http://www.securityfocus.com/bid/23359","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23359"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-455-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-455-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242034","reference_id":"242034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242034"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1900","reference_id":"CVE-2007-1900","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1900"},{"reference_url":"https://security.gentoo.org/glsa/200705-19","reference_id":"GLSA-200705-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-19"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://usn.ubuntu.com/455-1/","reference_id":"USN-455-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/455-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83282?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-1900"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzv8-12fu-9ba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42242?format=json","vulnerability_id":"VCID-rmzw-zrfz-qqcr","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4652.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4652","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38901","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38888","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38786","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43258","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43124","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4314","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4308","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4311","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43174","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=277971","reference_id":"277971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=277971"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/10557.php","reference_id":"CVE-2007-4652;CVE-2006-5178;OSVDB-63305;OSVDB-36866;OSVDB-29495","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/local/10557.php"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4652"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzw-zrfz-qqcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42237?format=json","vulnerability_id":"VCID-svg5-jd8s-mbb5","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996","reference_id":"","reference_type":"","scores":[{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09573","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13543","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94638","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94644","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94649","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15128","scoring_system":"epss","scoring_elements":"0.94663","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031","reference_id":"278031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278031"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456","reference_id":"443456","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525","reference_id":"601525","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/557-1/","reference_id":"USN-557-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/557-1/"},{"reference_url":"https://usn.ubuntu.com/720-1/","reference_id":"USN-720-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/720-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3996"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svg5-jd8s-mbb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42231?format=json","vulnerability_id":"VCID-t6ww-kp28-dfgj","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"},{"reference_url":"http://osvdb.org/36083","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36083"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2872","reference_id":"","reference_type":"","scores":[{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.9561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95676","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21049","scoring_system":"epss","scoring_elements":"0.95645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.9598","published_at":"2026-05-11T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95985","published_at":"2026-05-12T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95997","published_at":"2026-05-14T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95973","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23201","scoring_system":"epss","scoring_elements":"0.95977","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2872"},{"reference_url":"http://secunia.com/advisories/25456","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25456"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26838"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27351","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27351"},{"reference_url":"http://secunia.com/advisories/27377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27377"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/27864","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27864"},{"reference_url":"http://secunia.com/advisories/28318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28318"},{"reference_url":"http://secunia.com/advisories/28658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28658"},{"reference_url":"http://secunia.com/advisories/28750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28750"},{"reference_url":"http://secunia.com/advisories/28936","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28936"},{"reference_url":"http://secunia.com/advisories/30040","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30040"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39398","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39398"},{"reference_url":"https://issues.rpath.com/browse/RPL-1693","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1693"},{"reference_url":"https://issues.rpath.com/browse/RPL-1702","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1702"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"},{"reference_url":"https://launchpad.net/bugs/173043","reference_id":"","reference_type":"","scores":[],"url":"https://launchpad.net/bugs/173043"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/ChangeLog-4.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-4.php"},{"reference_url":"http://www.php.net/releases/4_4_8.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/4_4_8.php"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0888.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0888.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.sec-consult.com/291.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sec-consult.com/291.html"},{"reference_url":"http://www.securityfocus.com/archive/1/470244/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/470244/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24261"},{"reference_url":"http://www.securitytracker.com/id?1018186","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018186"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-549-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-549-2"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2061","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2061"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0059","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0059"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0398","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0398"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242032","reference_id":"242032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242032"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2872","reference_id":"CVE-2007-2872","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2872"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php","reference_id":"CVE-2007-2872;OSVDB-36083","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/30117.php"},{"reference_url":"https://www.securityfocus.com/bid/24261/info","reference_id":"CVE-2007-2872;OSVDB-36083","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24261/info"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-2872"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ww-kp28-dfgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=json","vulnerability_id":"VCID-tttf-2akk-57ez","summary":"Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.","references":[{"reference_url":"http://bugs.libgd.org/?do=details&task_id=86","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"},{"reference_url":"http://osvdb.org/35788","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/35788"},{"reference_url":"http://osvdb.org/36643","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36643"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756","reference_id":"","reference_type":"","scores":[{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91432","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91413","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06829","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91511","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07124","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25362","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25362"},{"reference_url":"http://secunia.com/advisories/25378","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25378"},{"reference_url":"http://secunia.com/advisories/25535","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25535"},{"reference_url":"http://secunia.com/advisories/25575","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25575"},{"reference_url":"http://secunia.com/advisories/25590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25590"},{"reference_url":"http://secunia.com/advisories/25646","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25646"},{"reference_url":"http://secunia.com/advisories/25657","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25657"},{"reference_url":"http://secunia.com/advisories/25658","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25658"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25855"},{"reference_url":"http://secunia.com/advisories/26048","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26048"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26390","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26390"},{"reference_url":"http://secunia.com/advisories/26871","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26871"},{"reference_url":"http://secunia.com/advisories/26895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26895"},{"reference_url":"http://secunia.com/advisories/26930","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26930"},{"reference_url":"http://secunia.com/advisories/26967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26967"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27110"},{"reference_url":"http://secunia.com/advisories/27545","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27545"},{"reference_url":"http://secunia.com/advisories/29157","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29157"},{"reference_url":"http://secunia.com/advisories/30168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30168"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200708-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200711-34.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200805-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"reference_url":"https://issues.rpath.com/browse/RPL-1394","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1394"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.libgd.org/ReleaseNote020035","reference_id":"","reference_type":"","scores":[],"url":"http://www.libgd.org/ReleaseNote020035"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"reference_url":"http://www.php.net/releases/5_2_3.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_3.php"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"reference_url":"http://www.securityfocus.com/bid/24089","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24089"},{"reference_url":"http://www.securitytracker.com/id?1018187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018187"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-473-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1904","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1905","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2016","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2336","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033","reference_id":"242033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=242033"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584","reference_id":"425584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100","reference_id":"426100","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426100"},{"reference_url":"https://security.archlinux.org/ASA-201701-1","reference_id":"ASA-201701-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-1"},{"reference_url":"https://security.archlinux.org/AVG-16","reference_id":"AVG-16","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-16"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756","reference_id":"CVE-2007-2756","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2756"},{"reference_url":"https://security.gentoo.org/glsa/200708-05","reference_id":"GLSA-200708-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200708-05"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0146","reference_id":"RHSA-2008:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0146"},{"reference_url":"https://usn.ubuntu.com/473-1/","reference_id":"USN-473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/473-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-2756"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42234?format=json","vulnerability_id":"VCID-xv9u-bcbq-pqfm","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://docs.info.apple.com/article.html?artnum=307562","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=307562"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3378.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3378.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3378","reference_id":"","reference_type":"","scores":[{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.8797","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87822","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.8787","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87897","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87928","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87925","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03642","scoring_system":"epss","scoring_elements":"0.87938","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3378"},{"reference_url":"http://seclists.org/fulldisclosure/2020/Sep/34","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2020/Sep/34"},{"reference_url":"http://secunia.com/advisories/26642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26642"},{"reference_url":"http://secunia.com/advisories/26822","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26822"},{"reference_url":"http://secunia.com/advisories/26838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26838"},{"reference_url":"http://secunia.com/advisories/27102","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27102"},{"reference_url":"http://secunia.com/advisories/27377","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27377"},{"reference_url":"http://secunia.com/advisories/27648","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27648"},{"reference_url":"http://secunia.com/advisories/28318","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28318"},{"reference_url":"http://secunia.com/advisories/28750","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28750"},{"reference_url":"http://secunia.com/advisories/28936","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28936"},{"reference_url":"http://secunia.com/advisories/29420","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29420"},{"reference_url":"http://secunia.com/advisories/30040","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30040"},{"reference_url":"http://securityreason.com/achievement_exploitalert/9","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_exploitalert/9"},{"reference_url":"http://securityreason.com/achievement_securityalert/45","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_securityalert/45"},{"reference_url":"http://securityreason.com/securityalert/2831","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/2831"},{"reference_url":"http://securityreason.com/securityalert/3389","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/3389"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35102","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35102"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39403","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39403"},{"reference_url":"https://issues.rpath.com/browse/RPL-1693","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1693"},{"reference_url":"https://issues.rpath.com/browse/RPL-1702","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1702"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/09/17/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2020/09/17/3"},{"reference_url":"http://www.osvdb.org/38682","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/38682"},{"reference_url":"http://www.php.net/ChangeLog-4.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-4.php"},{"reference_url":"http://www.php.net/ChangeLog-5.php#5.2.4","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-5.php#5.2.4"},{"reference_url":"http://www.php.net/ChangeLog-5.php#5.2.5","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/ChangeLog-5.php#5.2.5"},{"reference_url":"http://www.php.net/releases/4_4_8.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/4_4_8.php"},{"reference_url":"http://www.php.net/releases/5_2_4.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_4.php"},{"reference_url":"http://www.php.net/releases/5_2_5.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_5.php"},{"reference_url":"http://www.securityfocus.com/archive/1/472343/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/472343/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/491693/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24661"},{"reference_url":"http://www.securityfocus.com/bid/25498","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25498"},{"reference_url":"http://www.trustix.org/errata/2007/0026/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0026/"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3023","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3023"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0059","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0059"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0398","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0398"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0924/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278071","reference_id":"278071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278071"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3378","reference_id":"CVE-2007-3378","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3378"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3378"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xv9u-bcbq-pqfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42236?format=json","vulnerability_id":"VCID-y7bg-vxmf-tuhq","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3806","reference_id":"","reference_type":"","scores":[{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89938","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89977","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.89992","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.90004","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.9","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.90008","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05208","scoring_system":"epss","scoring_elements":"0.90022","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3806"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278091","reference_id":"278091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278091"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/4181.php","reference_id":"OSVDB-36085;CVE-2007-3806","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/4181.php"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3806"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y7bg-vxmf-tuhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42238?format=json","vulnerability_id":"VCID-yfkz-d1tn-4fgd","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3997.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3997","reference_id":"","reference_type":"","scores":[{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96666","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30122","scoring_system":"epss","scoring_elements":"0.96687","published_at":"2026-04-21T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.9685","published_at":"2026-05-07T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96856","published_at":"2026-05-09T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96858","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96864","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32052","scoring_system":"epss","scoring_elements":"0.96874","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3997"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278001","reference_id":"278001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278001"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/4392.txt","reference_id":"OSVDB-36868;CVE-2007-3997;OSVDB-36867","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/4392.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-3997"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfkz-d1tn-4fgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42259?format=json","vulnerability_id":"VCID-ypzg-se9g-eub8","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4784.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4784","reference_id":"","reference_type":"","scores":[{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79408","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79426","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79427","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79445","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01247","scoring_system":"epss","scoring_elements":"0.79485","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80443","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80528","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.8047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.8046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0141","scoring_system":"epss","scoring_elements":"0.80517","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4784"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=285901","reference_id":"285901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=285901"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4784"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ypzg-se9g-eub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42263?format=json","vulnerability_id":"VCID-yqzu-7yw6-3kcx","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4887.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4887","reference_id":"","reference_type":"","scores":[{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82842","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82863","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82884","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82897","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82933","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.8377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83764","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83793","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02021","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4887"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=290601","reference_id":"290601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=290601"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4887"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqzu-7yw6-3kcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42254?format=json","vulnerability_id":"VCID-z18y-5z5q-4yff","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4670","reference_id":"","reference_type":"","scores":[{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.8703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87052","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87067","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.8708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87095","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03195","scoring_system":"epss","scoring_elements":"0.87127","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87716","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.8774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87769","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.8778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03601","scoring_system":"epss","scoring_elements":"0.87773","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4670"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=278041","reference_id":"278041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=278041"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0888","reference_id":"RHSA-2007:0888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0889","reference_id":"RHSA-2007:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0890","reference_id":"RHSA-2007:0890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0891","reference_id":"RHSA-2007:0891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0891"},{"reference_url":"https://usn.ubuntu.com/549-1/","reference_id":"USN-549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/549-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4670"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z18y-5z5q-4yff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42255?format=json","vulnerability_id":"VCID-z3wv-cgxn-cyfs","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4727","reference_id":"","reference_type":"","scores":[{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.9515","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.952","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95202","published_at":"2026-04-26T12:55:00Z"},{"value":"0.18151","scoring_system":"epss","scoring_elements":"0.95201","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.95316","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.95322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.9533","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.95336","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.95342","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1873","scoring_system":"epss","scoring_elements":"0.95355","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441555","reference_id":"441555","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441555"},{"reference_url":"https://security.gentoo.org/glsa/200709-16","reference_id":"GLSA-200709-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-16"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75992?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}],"aliases":["CVE-2007-4727"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3wv-cgxn-cyfs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.4_p20070914-r2"}