Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77748?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "type": "ebuild", "namespace": "dev-lang", "name": "php", "version": "5.3.15", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.4.5", "latest_non_vulnerable_version": "8.3.12", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49121?format=api", "vulnerability_id": "VCID-23zq-8g2e-b3au", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2688", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96841", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96848", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96851", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96855", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96865", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.9687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96877", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96884", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96885", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96887", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96891", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96897", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.32676", "scoring_system": "epss", "scoring_elements": "0.96901", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=828051", "reference_id": "828051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828051" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514", "reference_id": "RHSA-2013:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307", "reference_id": "RHSA-2013:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1814", "reference_id": "RHSA-2013:1814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1814" }, { "reference_url": "https://usn.ubuntu.com/1569-1/", "reference_id": "USN-1569-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1569-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2688" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23zq-8g2e-b3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49115?format=api", "vulnerability_id": "VCID-2pjr-p6ge-nfa9", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93688", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93698", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.9372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93726", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93744", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93754", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93758", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93755", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93764", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.1185", "scoring_system": "epss", "scoring_elements": "0.93775", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1172" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=799187", "reference_id": "799187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799187" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045", "reference_id": "RHSA-2012:1045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-1172" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pjr-p6ge-nfa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3619?format=api", "vulnerability_id": "VCID-35a3-5eq3-8bep", "summary": "Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86493", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.8655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86569", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86594", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86593", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86614", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86632", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2143/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2012-2143/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956", "reference_id": "816956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://security.gentoo.org/glsa/201209-24", "reference_id": "GLSA-201209-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1036", "reference_id": "RHSA-2012:1036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037", "reference_id": "RHSA-2012:1037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1037" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1461-1/", "reference_id": "USN-1461-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1461-1/" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2143" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49110?format=api", "vulnerability_id": "VCID-3zy4-mx5a-yqbs", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81571", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81601", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81633", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81654", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.8164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81699", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81708", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81713", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81731", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0159", "scoring_system": "epss", "scoring_elements": "0.81752", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=782657", "reference_id": "782657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=782657" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045", "reference_id": "RHSA-2012:1045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1358-1/", "reference_id": "USN-1358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-0057" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zy4-mx5a-yqbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49107?format=api", "vulnerability_id": "VCID-53gf-rv7v-d3f3", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77824", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.7783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.7784", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77872", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77883", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77918", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77912", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01085", "scoring_system": "epss", "scoring_elements": "0.77966", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01467", "scoring_system": "epss", "scoring_elements": "0.80993", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01467", "scoring_system": "epss", "scoring_elements": "0.81016", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=741020", "reference_id": "741020", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=741020" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2011-3379" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53gf-rv7v-d3f3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49113?format=api", "vulnerability_id": "VCID-5cwv-tp4y-3yb3", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96311", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96326", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.9633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96346", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96348", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.9635", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.9636", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.26594", "scoring_system": "epss", "scoring_elements": "0.96365", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=786686", "reference_id": "786686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786686" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php", "reference_id": "OSVDB-78819;CVE-2012-0830", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0092", "reference_id": "RHSA-2012:0092", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0093", "reference_id": "RHSA-2012:0093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0093" }, { "reference_url": "https://usn.ubuntu.com/1358-1/", "reference_id": "USN-1358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-0830" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwv-tp4y-3yb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49106?format=api", "vulnerability_id": "VCID-6vuh-9zaj-u3dr", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "http://article.gmane.org/gmane.comp.php.devel/70584", "reference_id": "", "reference_type": "", "scores": [], "url": "http://article.gmane.org/gmane.comp.php.devel/70584" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2012/08/29/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2012/08/29/5" }, { "reference_url": "http://openwall.com/lists/oss-security/2012/09/05/15", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2012/09/05/15" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1398", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07905", "scoring_system": "epss", "scoring_elements": "0.92069", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07905", "scoring_system": "epss", "scoring_elements": "0.92056", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92573", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92583", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92586", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92588", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92589", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92585", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92572", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08906", "scoring_system": "epss", "scoring_elements": "0.92541", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1398" }, { "reference_url": "https://bugs.php.net/bug.php?id=60227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.php.net/bug.php?id=60227" }, { "reference_url": "http://secunia.com/advisories/55078", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55078" }, { "reference_url": "http://security-tracker.debian.org/tracker/CVE-2011-1398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security-tracker.debian.org/tracker/CVE-2011-1398" }, { "reference_url": "http://www.securitytracker.com/id?1027463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027463" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1569-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1569-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=853329", "reference_id": "853329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853329" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1398", "reference_id": "CVE-2011-1398", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1398" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt", "reference_id": "CVE-2011-1398;OSVDB-85086", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt" }, { "reference_url": "https://www.securityfocus.com/bid/55297/info", "reference_id": "CVE-2011-1398;OSVDB-85086", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/55297/info" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514", "reference_id": "RHSA-2013:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307", "reference_id": "RHSA-2013:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1814", "reference_id": "RHSA-2013:1814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1814" }, { "reference_url": "https://usn.ubuntu.com/1569-1/", "reference_id": "USN-1569-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1569-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2011-1398" ], "risk_score": 7.8, "exploitability": "2.0", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vuh-9zaj-u3dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49122?format=api", "vulnerability_id": "VCID-9seb-bqzd-7kgz", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75897", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75877", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75946", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75924", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75989", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.76", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.76011", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.7604", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3365" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=841972", "reference_id": "841972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841972" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-3365" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9seb-bqzd-7kgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49109?format=api", "vulnerability_id": "VCID-age2-x97h-m3bk", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4885", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99416", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.9942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.86573", "scoring_system": "epss", "scoring_elements": "0.99422", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4885" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=750547", "reference_id": "750547", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750547" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt", "reference_id": "CVE-2011-4885;OSVDB-78115", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py", "reference_id": "CVE-2011-4885;OSVDB-78115", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0019", "reference_id": "RHSA-2012:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0033", "reference_id": "RHSA-2012:0033", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0033" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0071", "reference_id": "RHSA-2012:0071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0071" }, { "reference_url": "https://usn.ubuntu.com/1358-1/", "reference_id": "USN-1358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2011-4885" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-age2-x97h-m3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49114?format=api", "vulnerability_id": "VCID-c7yt-uufn-6kgn", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93268", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93281", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.9329", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93294", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93298", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93321", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93328", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93332", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93325", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10633", "scoring_system": "epss", "scoring_elements": "0.93346", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0831" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789468", "reference_id": "789468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789468" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514", "reference_id": "RHSA-2013:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307", "reference_id": "RHSA-2013:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1307" }, { "reference_url": "https://usn.ubuntu.com/1358-1/", "reference_id": "USN-1358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-0831" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7yt-uufn-6kgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49117?format=api", "vulnerability_id": "VCID-e9tp-55er-6khz", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98868", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98844", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98847", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98849", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.9885", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98854", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98855", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98859", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98864", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98863", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.74532", "scoring_system": "epss", "scoring_elements": "0.98867", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.83245", "scoring_system": "epss", "scoring_elements": "0.99259", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2311" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=818907", "reference_id": "818907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818907" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://usn.ubuntu.com/1437-1/", "reference_id": "USN-1437-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1437-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2311" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9tp-55er-6khz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49111?format=api", "vulnerability_id": "VCID-gxpt-kwgy-zbap", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89899", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89949", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89956", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89969", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89968", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89981", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05214", "scoring_system": "epss", "scoring_elements": "0.89996", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0788" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783605", "reference_id": "783605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783605" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php", "reference_id": "CVE-2012-0788;OSVDB-79016", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php" }, { "reference_url": "https://www.securityfocus.com/bid/51952/info", "reference_id": "CVE-2012-0788;OSVDB-79016", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/51952/info" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://usn.ubuntu.com/1358-1/", "reference_id": "USN-1358-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1358-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-0788" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxpt-kwgy-zbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49120?format=api", "vulnerability_id": "VCID-hzpu-97n9-jqaa", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2386", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96478", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96487", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96495", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96506", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96518", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96525", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96532", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.28352", "scoring_system": "epss", "scoring_elements": "0.96533", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2386" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=823594", "reference_id": "823594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823594" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php", "reference_id": "OSVDB-72399;CVE-2012-2386", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2386" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzpu-97n9-jqaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49118?format=api", "vulnerability_id": "VCID-jd52-h8fq-5fem", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2335", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94871", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.9488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94903", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94905", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94922", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.1652", "scoring_system": "epss", "scoring_elements": "0.94935", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2335" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=820874", "reference_id": "820874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820874" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2335" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jd52-h8fq-5fem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49116?format=api", "vulnerability_id": "VCID-myft-jnpz-r7gb", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94363", "scoring_system": "epss", "scoring_elements": "0.99965", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.94386", "scoring_system": "epss", "scoring_elements": "0.99971", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.94386", "scoring_system": "epss", "scoring_elements": "0.99972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.94386", "scoring_system": "epss", "scoring_elements": "0.9997", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1823" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/07/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1" }, { "reference_url": "http://www.php.net/archive/2012.php#id2012-05-03-1", "reference_id": "2012.php#id2012-05-03-1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.php.net/archive/2012.php#id2012-05-03-1" }, { "reference_url": "http://secunia.com/advisories/49014", "reference_id": "49014", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://secunia.com/advisories/49014" }, { "reference_url": "http://secunia.com/advisories/49065", "reference_id": "49065", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://secunia.com/advisories/49065" }, { "reference_url": "http://secunia.com/advisories/49085", "reference_id": "49085", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://secunia.com/advisories/49085" }, { "reference_url": "http://secunia.com/advisories/49087", "reference_id": "49087", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://secunia.com/advisories/49087" }, { "reference_url": "http://www.kb.cert.org/vuls/id/520827", "reference_id": "520827", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.kb.cert.org/vuls/id/520827" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=818607", "reference_id": "818607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818607" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:068", "reference_id": "advisories?name=MDVSA-2012:068", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:068" }, { "reference_url": "https://bugs.php.net/bug.php?id=61910", "reference_id": "bug.php?id=61910", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "https://bugs.php.net/bug.php?id=61910" }, { "reference_url": "http://www.php.net/ChangeLog-5.php#5.4.2", "reference_id": "ChangeLog-5.php#5.4.2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.php.net/ChangeLog-5.php#5.4.2" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py", "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c", "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py", "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py" }, { "reference_url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/", "reference_id": "CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823", "reference_type": "exploit", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb", "reference_id": "CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb" }, { "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", "reference_id": "Document.jsp?objectID=c03360041", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "reference_url": "http://www.debian.org/security/2012/dsa-2465", "reference_id": "dsa-2465", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.debian.org/security/2012/dsa-2465" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "http://www.securitytracker.com/id?1027022", "reference_id": "id?1027022", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://www.securitytracker.com/id?1027022" }, { "reference_url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", "reference_id": "?l=bugtraq&m=134012830914727&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html" }, { "reference_url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1", "reference_id": "patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/", "reference_id": "PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0546", "reference_id": "RHSA-2012:0546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0546" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html", "reference_id": "RHSA-2012-0546.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0547", "reference_id": "RHSA-2012:0547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0547" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html", "reference_id": "RHSA-2012-0547.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0568", "reference_id": "RHSA-2012:0568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0568" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html", "reference_id": "RHSA-2012-0568.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0569", "reference_id": "RHSA-2012:0569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0569" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0569.html", "reference_id": "RHSA-2012-0569.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0569.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0570.html", "reference_id": "RHSA-2012-0570.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0570.html" }, { "reference_url": "https://usn.ubuntu.com/1437-1/", "reference_id": "USN-1437-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1437-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/", "reference_id": "W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-1823" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myft-jnpz-r7gb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49123?format=api", "vulnerability_id": "VCID-quge-cbz3-p7h2", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12009", "scoring_system": "epss", "scoring_elements": "0.93737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12009", "scoring_system": "epss", "scoring_elements": "0.93747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12009", "scoring_system": "epss", "scoring_elements": "0.93757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93889", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93916", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93919", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93918", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93926", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12383", "scoring_system": "epss", "scoring_elements": "0.93938", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3450" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=845372", "reference_id": "845372", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845372" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php", "reference_id": "CVE-2012-3450;OSVDB-82931", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php" }, { "reference_url": "https://www.securityfocus.com/bid/54777/info", "reference_id": "CVE-2012-3450;OSVDB-82931", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/54777/info" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://usn.ubuntu.com/1569-1/", "reference_id": "USN-1569-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1569-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-3450" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-quge-cbz3-p7h2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49119?format=api", "vulnerability_id": "VCID-vjm8-c1u4-wfab", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97713", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97684", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97691", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97699", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97701", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97702", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97708", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.47326", "scoring_system": "epss", "scoring_elements": "0.97711", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.5291", "scoring_system": "epss", "scoring_elements": "0.97931", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2336" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708", "reference_id": "820708", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045", "reference_id": "RHSA-2012:1045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-2336" ], "risk_score": 1.0, "exploitability": "2.0", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjm8-c1u4-wfab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49108?format=api", "vulnerability_id": "VCID-ytg7-b7vh-1ubw", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.9716", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97161", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97162", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97169", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97177", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97179", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97184", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.37102", "scoring_system": "epss", "scoring_elements": "0.97188", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4566" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=758413", "reference_id": "758413", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758413" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0019", "reference_id": "RHSA-2012:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0033", "reference_id": "RHSA-2012:0033", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0033" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0071", "reference_id": "RHSA-2012:0071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0071" }, { "reference_url": "https://usn.ubuntu.com/1307-1/", "reference_id": "USN-1307-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1307-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2011-4566" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytg7-b7vh-1ubw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49112?format=api", "vulnerability_id": "VCID-zquc-69kh-yqdg", "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n to remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91937", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91968", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91987", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.9198", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91985", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91983", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91981", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.91994", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0779", "scoring_system": "epss", "scoring_elements": "0.92007", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783609", "reference_id": "783609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783609" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php", "reference_id": "CVE-2012-0789;OSVDB-79332", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php" }, { "reference_url": "https://www.securityfocus.com/bid/52043/info", "reference_id": "CVE-2012-0789;OSVDB-79332", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/52043/info" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045", "reference_id": "RHSA-2012:1045", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1045" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api", "purl": "pkg:ebuild/dev-lang/php@5.3.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api", "purl": "pkg:ebuild/dev-lang/php@5.4.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5" } ], "aliases": [ "CVE-2012-0789" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zquc-69kh-yqdg" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15" }