Lookup for vulnerable packages by Package URL.

GET /api/packages/77748?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
    "type": "ebuild",
    "namespace": "dev-lang",
    "name": "php",
    "version": "5.3.15",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.4.5",
    "latest_non_vulnerable_version": "8.3.12",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49121?format=api",
            "vulnerability_id": "VCID-23zq-8g2e-b3au",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96841",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96848",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96855",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96864",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96865",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96868",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96877",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96882",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96884",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96885",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96887",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96891",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96897",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.32676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96901",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2688"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=828051",
                    "reference_id": "828051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828051"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514",
                    "reference_id": "RHSA-2013:0514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307",
                    "reference_id": "RHSA-2013:1307",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1307"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1814",
                    "reference_id": "RHSA-2013:1814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1569-1/",
                    "reference_id": "USN-1569-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1569-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2688"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23zq-8g2e-b3au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49115?format=api",
            "vulnerability_id": "VCID-2pjr-p6ge-nfa9",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93688",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93698",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93708",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9372",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93722",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93726",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93727",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93744",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93751",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93754",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93758",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93755",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93764",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93775",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1172"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=799187",
                    "reference_id": "799187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799187"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045",
                    "reference_id": "RHSA-2012:1045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1045"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-1172"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pjr-p6ge-nfa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3619?format=api",
            "vulnerability_id": "VCID-35a3-5eq3-8bep",
            "summary": "Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86493",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8655",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86565",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86562",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86555",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86569",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86574",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86594",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86593",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86614",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86632",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2143/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-2143/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956",
                    "reference_id": "816956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1036",
                    "reference_id": "RHSA-2012:1036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037",
                    "reference_id": "RHSA-2012:1037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1461-1/",
                    "reference_id": "USN-1461-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1461-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2143"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49110?format=api",
            "vulnerability_id": "VCID-3zy4-mx5a-yqbs",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81571",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81601",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81628",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81633",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81654",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8164",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81634",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81672",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81676",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81699",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81708",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81713",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81731",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81752",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0057"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=782657",
                    "reference_id": "782657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=782657"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045",
                    "reference_id": "RHSA-2012:1045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1045"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1358-1/",
                    "reference_id": "USN-1358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-0057"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zy4-mx5a-yqbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49107?format=api",
            "vulnerability_id": "VCID-53gf-rv7v-d3f3",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77824",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7783",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7784",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77867",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77872",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77883",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77882",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77919",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77918",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77946",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77953",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77966",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80993",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81016",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3379"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=741020",
                    "reference_id": "741020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=741020"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2011-3379"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53gf-rv7v-d3f3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49113?format=api",
            "vulnerability_id": "VCID-5cwv-tp4y-3yb3",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96295",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96303",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96311",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96315",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96323",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96326",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96333",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96346",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96347",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96348",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9635",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9636",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.26594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96365",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=786686",
                    "reference_id": "786686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786686"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php",
                    "reference_id": "OSVDB-78819;CVE-2012-0830",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0092",
                    "reference_id": "RHSA-2012:0092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0093",
                    "reference_id": "RHSA-2012:0093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0093"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1358-1/",
                    "reference_id": "USN-1358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-0830"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwv-tp4y-3yb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49106?format=api",
            "vulnerability_id": "VCID-6vuh-9zaj-u3dr",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://article.gmane.org/gmane.comp.php.devel/70584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://article.gmane.org/gmane.comp.php.devel/70584"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2012/08/29/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2012/08/29/5"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2012/09/05/15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2012/09/05/15"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92069",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.07905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92056",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92551",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92562",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92573",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92536",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92584",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92583",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92586",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92588",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92589",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92585",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92572",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92541",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1398"
                },
                {
                    "reference_url": "https://bugs.php.net/bug.php?id=60227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.php.net/bug.php?id=60227"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55078"
                },
                {
                    "reference_url": "http://security-tracker.debian.org/tracker/CVE-2011-1398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security-tracker.debian.org/tracker/CVE-2011-1398"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027463",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027463"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1569-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1569-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=853329",
                    "reference_id": "853329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853329"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1398",
                    "reference_id": "CVE-2011-1398",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1398"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt",
                    "reference_id": "CVE-2011-1398;OSVDB-85086",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/55297/info",
                    "reference_id": "CVE-2011-1398;OSVDB-85086",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/55297/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514",
                    "reference_id": "RHSA-2013:0514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307",
                    "reference_id": "RHSA-2013:1307",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1307"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1814",
                    "reference_id": "RHSA-2013:1814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1569-1/",
                    "reference_id": "USN-1569-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1569-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2011-1398"
            ],
            "risk_score": 7.8,
            "exploitability": "2.0",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vuh-9zaj-u3dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49122?format=api",
            "vulnerability_id": "VCID-9seb-bqzd-7kgz",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75862",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75897",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75877",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75909",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75923",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75946",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75924",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75917",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75955",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75957",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75942",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75979",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75989",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76011",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7604",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=841972",
                    "reference_id": "841972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841972"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-3365"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9seb-bqzd-7kgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49109?format=api",
            "vulnerability_id": "VCID-age2-x97h-m3bk",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99411",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99413",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99414",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99415",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99418",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99421",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9942",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.86573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99422",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4885"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=750547",
                    "reference_id": "750547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750547"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt",
                    "reference_id": "CVE-2011-4885;OSVDB-78115",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py",
                    "reference_id": "CVE-2011-4885;OSVDB-78115",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0019",
                    "reference_id": "RHSA-2012:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0033",
                    "reference_id": "RHSA-2012:0033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0033"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0071",
                    "reference_id": "RHSA-2012:0071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0071"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1358-1/",
                    "reference_id": "USN-1358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2011-4885"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-age2-x97h-m3bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49114?format=api",
            "vulnerability_id": "VCID-c7yt-uufn-6kgn",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0831",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93268",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93282",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93281",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9329",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93294",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93298",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93316",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93321",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93328",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93332",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93325",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93346",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0831"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789468",
                    "reference_id": "789468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0514",
                    "reference_id": "RHSA-2013:0514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1307",
                    "reference_id": "RHSA-2013:1307",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1307"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1358-1/",
                    "reference_id": "USN-1358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-0831"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7yt-uufn-6kgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49117?format=api",
            "vulnerability_id": "VCID-e9tp-55er-6khz",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98868",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98842",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98844",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98847",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98849",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98854",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98855",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98859",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98864",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98863",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.74532",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98867",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.83245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99259",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2311"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=818907",
                    "reference_id": "818907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818907"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1437-1/",
                    "reference_id": "USN-1437-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1437-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2311"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9tp-55er-6khz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49111?format=api",
            "vulnerability_id": "VCID-gxpt-kwgy-zbap",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89899",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8992",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89943",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89951",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89949",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89942",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89956",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89957",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89952",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89969",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89968",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89981",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89996",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0788"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783605",
                    "reference_id": "783605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783605"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php",
                    "reference_id": "CVE-2012-0788;OSVDB-79016",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/51952/info",
                    "reference_id": "CVE-2012-0788;OSVDB-79016",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/51952/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1358-1/",
                    "reference_id": "USN-1358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-0788"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxpt-kwgy-zbap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49120?format=api",
            "vulnerability_id": "VCID-hzpu-97n9-jqaa",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96478",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96487",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96491",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96495",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96509",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96518",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96524",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96523",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96525",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96532",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.28352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96533",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2386"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=823594",
                    "reference_id": "823594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823594"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php",
                    "reference_id": "OSVDB-72399;CVE-2012-2386",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2386"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzpu-97n9-jqaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49118?format=api",
            "vulnerability_id": "VCID-jd52-h8fq-5fem",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94871",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94883",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94894",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94903",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94905",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94917",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94921",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94922",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94928",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.1652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94935",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2335"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=820874",
                    "reference_id": "820874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820874"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2335"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jd52-h8fq-5fem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49116?format=api",
            "vulnerability_id": "VCID-myft-jnpz-r7gb",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.94363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99965",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.94386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99971",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.94386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99972",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.94386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9997",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1823"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/07/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1"
                },
                {
                    "reference_url": "http://www.php.net/archive/2012.php#id2012-05-03-1",
                    "reference_id": "2012.php#id2012-05-03-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.php.net/archive/2012.php#id2012-05-03-1"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49014",
                    "reference_id": "49014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/49014"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49065",
                    "reference_id": "49065",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/49065"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49085",
                    "reference_id": "49085",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/49085"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49087",
                    "reference_id": "49087",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/49087"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/520827",
                    "reference_id": "520827",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/520827"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=818607",
                    "reference_id": "818607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818607"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:068",
                    "reference_id": "advisories?name=MDVSA-2012:068",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:068"
                },
                {
                    "reference_url": "https://bugs.php.net/bug.php?id=61910",
                    "reference_id": "bug.php?id=61910",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "https://bugs.php.net/bug.php?id=61910"
                },
                {
                    "reference_url": "http://www.php.net/ChangeLog-5.php#5.4.2",
                    "reference_id": "ChangeLog-5.php#5.4.2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.php.net/ChangeLog-5.php#5.4.2"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py",
                    "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c",
                    "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py",
                    "reference_id": "CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py"
                },
                {
                    "reference_url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/",
                    "reference_id": "CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823",
                    "reference_type": "exploit",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb",
                    "reference_id": "CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041",
                    "reference_id": "Document.jsp?objectID=c03360041",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2465",
                    "reference_id": "dsa-2465",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2012/dsa-2465"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027022",
                    "reference_id": "id?1027022",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id?1027022"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2",
                    "reference_id": "?l=bugtraq&m=134012830914727&w=2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html",
                    "reference_id": "msg00007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html"
                },
                {
                    "reference_url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1",
                    "reference_id": "patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
                    "reference_id": "PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0546",
                    "reference_id": "RHSA-2012:0546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0546"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html",
                    "reference_id": "RHSA-2012-0546.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0547",
                    "reference_id": "RHSA-2012:0547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0547"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html",
                    "reference_id": "RHSA-2012-0547.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0568",
                    "reference_id": "RHSA-2012:0568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0568"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html",
                    "reference_id": "RHSA-2012-0568.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0569",
                    "reference_id": "RHSA-2012:0569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0569"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0569.html",
                    "reference_id": "RHSA-2012-0569.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0569.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0570.html",
                    "reference_id": "RHSA-2012-0570.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0570.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1437-1/",
                    "reference_id": "USN-1437-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1437-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
                    "reference_id": "W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-1823"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myft-jnpz-r7gb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49123?format=api",
            "vulnerability_id": "VCID-quge-cbz3-p7h2",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93737",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93889",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93911",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93916",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93919",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93918",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93926",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.12383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93938",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3450"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=845372",
                    "reference_id": "845372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845372"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php",
                    "reference_id": "CVE-2012-3450;OSVDB-82931",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/54777/info",
                    "reference_id": "CVE-2012-3450;OSVDB-82931",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/54777/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1569-1/",
                    "reference_id": "USN-1569-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1569-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-3450"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-quge-cbz3-p7h2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49119?format=api",
            "vulnerability_id": "VCID-vjm8-c1u4-wfab",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97713",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97678",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97679",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97689",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97691",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97699",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97701",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97702",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97708",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.47326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97711",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.5291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97931",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2336"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708",
                    "reference_id": "820708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045",
                    "reference_id": "RHSA-2012:1045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1045"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-2336"
            ],
            "risk_score": 1.0,
            "exploitability": "2.0",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjm8-c1u4-wfab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49108?format=api",
            "vulnerability_id": "VCID-ytg7-b7vh-1ubw",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97132",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97139",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97145",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9716",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97161",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97162",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97171",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97177",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97179",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97184",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.37102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97188",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4566"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=758413",
                    "reference_id": "758413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758413"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0019",
                    "reference_id": "RHSA-2012:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0033",
                    "reference_id": "RHSA-2012:0033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0033"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0071",
                    "reference_id": "RHSA-2012:0071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0071"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1307-1/",
                    "reference_id": "USN-1307-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1307-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2011-4566"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytg7-b7vh-1ubw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49112?format=api",
            "vulnerability_id": "VCID-zquc-69kh-yqdg",
            "summary": "Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91929",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91937",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91951",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91964",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91971",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91968",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91984",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9198",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91985",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91983",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91981",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91994",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0779",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92007",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0789"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783609",
                    "reference_id": "783609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783609"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php",
                    "reference_id": "CVE-2012-0789;OSVDB-79332",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/52043/info",
                    "reference_id": "CVE-2012-0789;OSVDB-79332",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/52043/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1045",
                    "reference_id": "RHSA-2012:1045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1045"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77748?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.3.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77749?format=api",
                    "purl": "pkg:ebuild/dev-lang/php@5.4.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"
                }
            ],
            "aliases": [
                "CVE-2012-0789"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zquc-69kh-yqdg"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"
}