{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","type":"ebuild","namespace":"dev-lang","name":"php","version":"7.4.4","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7.4.9","latest_non_vulnerable_version":"8.3.12","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43015?format=json","vulnerability_id":"VCID-2adj-dp22-xyeb","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7062.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7062","reference_id":"","reference_type":"","scores":[{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.7856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.786","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78634","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78658","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01155","scoring_system":"epss","scoring_elements":"0.78673","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808532","reference_id":"1808532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808532"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4330-1/","reference_id":"USN-4330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7062"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2adj-dp22-xyeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43016?format=json","vulnerability_id":"VCID-3xsn-r6dz-rfbv","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7063.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7063","reference_id":"","reference_type":"","scores":[{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53498","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53596","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.5362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53543","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808536","reference_id":"1808536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808536"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4330-1/","reference_id":"USN-4330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7063"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xsn-r6dz-rfbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43011?format=json","vulnerability_id":"VCID-dcbh-qs9z-ubaw","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19518.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19518","reference_id":"","reference_type":"","scores":[{"value":"0.93869","scoring_system":"epss","scoring_elements":"0.99873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.93869","scoring_system":"epss","scoring_elements":"0.9987","published_at":"2026-04-24T12:55:00Z"},{"value":"0.93869","scoring_system":"epss","scoring_elements":"0.99871","published_at":"2026-04-29T12:55:00Z"},{"value":"0.93869","scoring_system":"epss","scoring_elements":"0.99872","published_at":"2026-05-07T12:55:00Z"},{"value":"0.93956","scoring_system":"epss","scoring_elements":"0.99882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.93956","scoring_system":"epss","scoring_elements":"0.99883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.93956","scoring_system":"epss","scoring_elements":"0.99884","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654228","reference_id":"1654228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654228"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914632","reference_id":"914632","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914632"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45914.rb","reference_id":"CVE-2018-19518","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45914.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b3ad4a03581f53c670d91e82d2a4ef00ec392f8f/modules/exploits/linux/http/php_imap_open_rce.rb","reference_id":"CVE-2018-19518","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b3ad4a03581f53c670d91e82d2a4ef00ec392f8f/modules/exploits/linux/http/php_imap_open_rce.rb"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://usn.ubuntu.com/4160-1/","reference_id":"USN-4160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4160-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2018-19518"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcbh-qs9z-ubaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43019?format=json","vulnerability_id":"VCID-h5jx-kf86-5yej","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7066.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7066","reference_id":"","reference_type":"","scores":[{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81258","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81329","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81383","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7066"},{"reference_url":"https://bugs.php.net/bug.php?id=79329","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=79329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200403-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200403-0001/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4717","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4717"},{"reference_url":"https://www.debian.org/security/2020/dsa-4719","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4719"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820604","reference_id":"1820604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820604"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:5.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:5.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:5.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7066","reference_id":"CVE-2020-7066","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7066"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4330-1/","reference_id":"USN-4330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-1/"},{"reference_url":"https://usn.ubuntu.com/4330-2/","reference_id":"USN-4330-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7066"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5jx-kf86-5yej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43012?format=json","vulnerability_id":"VCID-hak4-3ww9-aydn","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7059.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7059","reference_id":"","reference_type":"","scores":[{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84948","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.8497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.84985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85018","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85032","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85057","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02373","scoring_system":"epss","scoring_elements":"0.85077","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797776","reference_id":"1797776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797776"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4279-1/","reference_id":"USN-4279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7059"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hak4-3ww9-aydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43013?format=json","vulnerability_id":"VCID-hv57-6hth-6qfj","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7060.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7060","reference_id":"","reference_type":"","scores":[{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.90999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91058","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91082","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06404","scoring_system":"epss","scoring_elements":"0.9111","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797779","reference_id":"1797779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797779"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4279-1/","reference_id":"USN-4279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7060"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hv57-6hth-6qfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43018?format=json","vulnerability_id":"VCID-ky48-2f2t-c7bb","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7065.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7065","reference_id":"","reference_type":"","scores":[{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89794","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.8969","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89725","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.8973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05019","scoring_system":"epss","scoring_elements":"0.89756","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7065"},{"reference_url":"https://bugs.php.net/bug.php?id=79371","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=79371"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200403-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200403-0001/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4719","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4719"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"reference_url":"https://www.php.net/ChangeLog-7.php#7.4.4","reference_id":"","reference_type":"","scores":[],"url":"https://www.php.net/ChangeLog-7.php#7.4.4"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820627","reference_id":"1820627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820627"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7065","reference_id":"CVE-2020-7065","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7065"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4330-1/","reference_id":"USN-4330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-1/"},{"reference_url":"https://usn.ubuntu.com/4330-2/","reference_id":"USN-4330-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7065"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ky48-2f2t-c7bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43017?format=json","vulnerability_id":"VCID-p9rr-rq6w-3bhg","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7064.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7064","reference_id":"","reference_type":"","scores":[{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84946","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.8477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.8482","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84835","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.8483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.84852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0233","scoring_system":"epss","scoring_elements":"0.8485","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7064"},{"reference_url":"https://bugs.php.net/bug.php?id=79282","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=79282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7067"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00021.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200403-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200403-0001/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4717","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4717"},{"reference_url":"https://www.debian.org/security/2020/dsa-4719","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4719"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820601","reference_id":"1820601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820601"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7064","reference_id":"CVE-2020-7064","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"},{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7064"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3662","reference_id":"RHSA-2020:3662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5275","reference_id":"RHSA-2020:5275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5275"},{"reference_url":"https://usn.ubuntu.com/4330-1/","reference_id":"USN-4330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-1/"},{"reference_url":"https://usn.ubuntu.com/4330-2/","reference_id":"USN-4330-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4330-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7064"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9rr-rq6w-3bhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43014?format=json","vulnerability_id":"VCID-zjc4-mxte-f7hz","summary":"Multiple vulnerabilities have been found in PHP, the worst of which\n    could result in the execution of arbitrary shell commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7061.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7061","reference_id":"","reference_type":"","scores":[{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.85967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.85978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.85994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86023","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.8603","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02767","scoring_system":"epss","scoring_elements":"0.86133","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7061"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808529","reference_id":"1808529","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1808529"},{"reference_url":"https://security.gentoo.org/glsa/202003-57","reference_id":"GLSA-202003-57","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-57"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76182?format=json","purl":"pkg:ebuild/dev-lang/php@7.2.29","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.29"},{"url":"http://public2.vulnerablecode.io/api/packages/76183?format=json","purl":"pkg:ebuild/dev-lang/php@7.3.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.16"},{"url":"http://public2.vulnerablecode.io/api/packages/76184?format=json","purl":"pkg:ebuild/dev-lang/php@7.4.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}],"aliases":["CVE-2020-7061"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjc4-mxte-f7hz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.4.4"}