{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","type":"ebuild","namespace":"dev-lang","name":"php","version":"5.4.5","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.5.16","latest_non_vulnerable_version":"8.3.12","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49121?format=json","vulnerability_id":"VCID-23zq-8g2e-b3au","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2688.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2688","reference_id":"","reference_type":"","scores":[{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96855","published_at":"2026-04-07T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.9687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96877","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96884","published_at":"2026-04-21T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96887","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32676","scoring_system":"epss","scoring_elements":"0.96891","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2688"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=828051","reference_id":"828051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=828051"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0514","reference_id":"RHSA-2013:0514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1307","reference_id":"RHSA-2013:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1814","reference_id":"RHSA-2013:1814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1814"},{"reference_url":"https://usn.ubuntu.com/1569-1/","reference_id":"USN-1569-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1569-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2688"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23zq-8g2e-b3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49115?format=json","vulnerability_id":"VCID-2pjr-p6ge-nfa9","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1172","reference_id":"","reference_type":"","scores":[{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.9372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93726","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93744","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1185","scoring_system":"epss","scoring_elements":"0.93755","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=799187","reference_id":"799187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=799187"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1045","reference_id":"RHSA-2012:1045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"},{"reference_url":"https://usn.ubuntu.com/1481-1/","reference_id":"USN-1481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1481-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-1172"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pjr-p6ge-nfa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3619?format=json","vulnerability_id":"VCID-35a3-5eq3-8bep","summary":"Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2143","reference_id":"","reference_type":"","scores":[{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.8655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86574","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86567","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02995","scoring_system":"epss","scoring_elements":"0.86593","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2143"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2012-2143/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2012-2143/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=816956","reference_id":"816956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=816956"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://security.gentoo.org/glsa/201209-24","reference_id":"GLSA-201209-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1036","reference_id":"RHSA-2012:1036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1037","reference_id":"RHSA-2012:1037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"},{"reference_url":"https://usn.ubuntu.com/1461-1/","reference_id":"USN-1461-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1461-1/"},{"reference_url":"https://usn.ubuntu.com/1481-1/","reference_id":"USN-1481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1481-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2143"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49110?format=json","vulnerability_id":"VCID-3zy4-mx5a-yqbs","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0057","reference_id":"","reference_type":"","scores":[{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81601","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.8164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0159","scoring_system":"epss","scoring_elements":"0.81713","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0057"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=782657","reference_id":"782657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=782657"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1045","reference_id":"RHSA-2012:1045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"},{"reference_url":"https://usn.ubuntu.com/1358-1/","reference_id":"USN-1358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-0057"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zy4-mx5a-yqbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49107?format=json","vulnerability_id":"VCID-53gf-rv7v-d3f3","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3379","reference_id":"","reference_type":"","scores":[{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77824","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.7783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.7784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77912","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77953","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01085","scoring_system":"epss","scoring_elements":"0.77966","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=741020","reference_id":"741020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=741020"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2011-3379"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-53gf-rv7v-d3f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49113?format=json","vulnerability_id":"VCID-5cwv-tp4y-3yb3","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0830","reference_id":"","reference_type":"","scores":[{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96326","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.9633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96333","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.96348","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26594","scoring_system":"epss","scoring_elements":"0.9635","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=786686","reference_id":"786686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=786686"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php","reference_id":"OSVDB-78819;CVE-2012-0830","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18460.php"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0092","reference_id":"RHSA-2012:0092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0093","reference_id":"RHSA-2012:0093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0093"},{"reference_url":"https://usn.ubuntu.com/1358-1/","reference_id":"USN-1358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-0830"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwv-tp4y-3yb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49106?format=json","vulnerability_id":"VCID-6vuh-9zaj-u3dr","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"http://article.gmane.org/gmane.comp.php.devel/70584","reference_id":"","reference_type":"","scores":[],"url":"http://article.gmane.org/gmane.comp.php.devel/70584"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html"},{"reference_url":"http://openwall.com/lists/oss-security/2012/08/29/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2012/08/29/5"},{"reference_url":"http://openwall.com/lists/oss-security/2012/09/05/15","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2012/09/05/15"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1307.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1307.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1398.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1398","reference_id":"","reference_type":"","scores":[{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92585","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08906","scoring_system":"epss","scoring_elements":"0.92589","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1398"},{"reference_url":"https://bugs.php.net/bug.php?id=60227","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.php.net/bug.php?id=60227"},{"reference_url":"http://secunia.com/advisories/55078","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55078"},{"reference_url":"http://security-tracker.debian.org/tracker/CVE-2011-1398","reference_id":"","reference_type":"","scores":[],"url":"http://security-tracker.debian.org/tracker/CVE-2011-1398"},{"reference_url":"http://www.securitytracker.com/id?1027463","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027463"},{"reference_url":"http://www.ubuntu.com/usn/USN-1569-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1569-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=853329","reference_id":"853329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=853329"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1398","reference_id":"CVE-2011-1398","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1398"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt","reference_id":"CVE-2011-1398;OSVDB-85086","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/37688.txt"},{"reference_url":"https://www.securityfocus.com/bid/55297/info","reference_id":"CVE-2011-1398;OSVDB-85086","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/55297/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0514","reference_id":"RHSA-2013:0514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1307","reference_id":"RHSA-2013:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1814","reference_id":"RHSA-2013:1814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1814"},{"reference_url":"https://usn.ubuntu.com/1569-1/","reference_id":"USN-1569-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1569-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2011-1398"],"risk_score":7.8,"exploitability":"2.0","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6vuh-9zaj-u3dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49122?format=json","vulnerability_id":"VCID-9seb-bqzd-7kgz","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3365","reference_id":"","reference_type":"","scores":[{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75897","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75924","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75989","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.76","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=841972","reference_id":"841972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=841972"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-3365"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9seb-bqzd-7kgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49109?format=json","vulnerability_id":"VCID-age2-x97h-m3bk","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4885","reference_id":"","reference_type":"","scores":[{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99414","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99418","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99421","published_at":"2026-04-16T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.86573","scoring_system":"epss","scoring_elements":"0.99422","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4885"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=750547","reference_id":"750547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=750547"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt","reference_id":"CVE-2011-4885;OSVDB-78115","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18296.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py","reference_id":"CVE-2011-4885;OSVDB-78115","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/18305.py"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0019","reference_id":"RHSA-2012:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0033","reference_id":"RHSA-2012:0033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0071","reference_id":"RHSA-2012:0071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0071"},{"reference_url":"https://usn.ubuntu.com/1358-1/","reference_id":"USN-1358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2011-4885"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-age2-x97h-m3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49114?format=json","vulnerability_id":"VCID-c7yt-uufn-6kgn","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0831","reference_id":"","reference_type":"","scores":[{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.9329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93294","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93296","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93321","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93328","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93332","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10633","scoring_system":"epss","scoring_elements":"0.93325","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=789468","reference_id":"789468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=789468"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0514","reference_id":"RHSA-2013:0514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1307","reference_id":"RHSA-2013:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1307"},{"reference_url":"https://usn.ubuntu.com/1358-1/","reference_id":"USN-1358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-0831"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c7yt-uufn-6kgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49117?format=json","vulnerability_id":"VCID-e9tp-55er-6khz","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2311","reference_id":"","reference_type":"","scores":[{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98863","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.9885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74532","scoring_system":"epss","scoring_elements":"0.98864","published_at":"2026-04-29T12:55:00Z"},{"value":"0.83245","scoring_system":"epss","scoring_elements":"0.99259","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2311"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=818907","reference_id":"818907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=818907"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://usn.ubuntu.com/1437-1/","reference_id":"USN-1437-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1437-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2311"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9tp-55er-6khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49111?format=json","vulnerability_id":"VCID-gxpt-kwgy-zbap","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0788","reference_id":"","reference_type":"","scores":[{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89952","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89969","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05214","scoring_system":"epss","scoring_elements":"0.89968","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0788"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783605","reference_id":"783605","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783605"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php","reference_id":"CVE-2012-0788;OSVDB-79016","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36682.php"},{"reference_url":"https://www.securityfocus.com/bid/51952/info","reference_id":"CVE-2012-0788;OSVDB-79016","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/51952/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://usn.ubuntu.com/1358-1/","reference_id":"USN-1358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-0788"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gxpt-kwgy-zbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49120?format=json","vulnerability_id":"VCID-hzpu-97n9-jqaa","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2386","reference_id":"","reference_type":"","scores":[{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96487","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96518","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96524","published_at":"2026-04-24T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28352","scoring_system":"epss","scoring_elements":"0.96525","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2386"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=823594","reference_id":"823594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=823594"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php","reference_id":"OSVDB-72399;CVE-2012-2386","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17201.php"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"},{"reference_url":"https://usn.ubuntu.com/1481-1/","reference_id":"USN-1481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1481-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2386"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hzpu-97n9-jqaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49118?format=json","vulnerability_id":"VCID-jd52-h8fq-5fem","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2335.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2335","reference_id":"","reference_type":"","scores":[{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.9488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94903","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1652","scoring_system":"epss","scoring_elements":"0.94922","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2335"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=820874","reference_id":"820874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=820874"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://usn.ubuntu.com/1481-1/","reference_id":"USN-1481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1481-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2335"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jd52-h8fq-5fem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49116?format=json","vulnerability_id":"VCID-myft-jnpz-r7gb","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1823","reference_id":"","reference_type":"","scores":[{"value":"0.94363","scoring_system":"epss","scoring_elements":"0.99965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.94386","scoring_system":"epss","scoring_elements":"0.99971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.94386","scoring_system":"epss","scoring_elements":"0.99972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.94386","scoring_system":"epss","scoring_elements":"0.9997","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1823"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/07/1","reference_id":"1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/07/1"},{"reference_url":"http://www.php.net/archive/2012.php#id2012-05-03-1","reference_id":"2012.php#id2012-05-03-1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.php.net/archive/2012.php#id2012-05-03-1"},{"reference_url":"http://secunia.com/advisories/49014","reference_id":"49014","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://secunia.com/advisories/49014"},{"reference_url":"http://secunia.com/advisories/49065","reference_id":"49065","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://secunia.com/advisories/49065"},{"reference_url":"http://secunia.com/advisories/49085","reference_id":"49085","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://secunia.com/advisories/49085"},{"reference_url":"http://secunia.com/advisories/49087","reference_id":"49087","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://secunia.com/advisories/49087"},{"reference_url":"http://www.kb.cert.org/vuls/id/520827","reference_id":"520827","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.kb.cert.org/vuls/id/520827"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=818607","reference_id":"818607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=818607"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:068","reference_id":"advisories?name=MDVSA-2012:068","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:068"},{"reference_url":"https://bugs.php.net/bug.php?id=61910","reference_id":"bug.php?id=61910","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"https://bugs.php.net/bug.php?id=61910"},{"reference_url":"http://www.php.net/ChangeLog-5.php#5.4.2","reference_id":"ChangeLog-5.php#5.4.2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.php.net/ChangeLog-5.php#5.4.2"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py","reference_id":"CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18836.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c","reference_id":"CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29290.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py","reference_id":"CVE-2012-2336;CVE-2012-2311;CVE-2012-1823;OSVDB-81633","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/29316.py"},{"reference_url":"http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/","reference_id":"CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823","reference_type":"exploit","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb","reference_id":"CVE-2012-2336;OSVDB-81633;CVE-2012-2311;CVE-2012-1823","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/18834.rb"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041","reference_id":"Document.jsp?objectID=c03360041","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"},{"reference_url":"http://www.debian.org/security/2012/dsa-2465","reference_id":"dsa-2465","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.debian.org/security/2012/dsa-2465"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"http://www.securitytracker.com/id?1027022","reference_id":"id?1027022","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://www.securitytracker.com/id?1027022"},{"reference_url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2","reference_id":"?l=bugtraq&m=134012830914727&w=2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html","reference_id":"msg00002.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html"},{"reference_url":"https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1","reference_id":"patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/","reference_id":"PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0546","reference_id":"RHSA-2012:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0546"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0546.html","reference_id":"RHSA-2012-0546.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0546.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0547","reference_id":"RHSA-2012:0547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0547"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0547.html","reference_id":"RHSA-2012-0547.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0547.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0568","reference_id":"RHSA-2012:0568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0568"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0568.html","reference_id":"RHSA-2012-0568.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0568.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0569","reference_id":"RHSA-2012:0569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0569"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0569.html","reference_id":"RHSA-2012-0569.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0569.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0570.html","reference_id":"RHSA-2012-0570.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0570.html"},{"reference_url":"https://usn.ubuntu.com/1437-1/","reference_id":"USN-1437-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1437-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/","reference_id":"W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:10:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-1823"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myft-jnpz-r7gb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49123?format=json","vulnerability_id":"VCID-quge-cbz3-p7h2","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3450.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3450","reference_id":"","reference_type":"","scores":[{"value":"0.12009","scoring_system":"epss","scoring_elements":"0.93737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12009","scoring_system":"epss","scoring_elements":"0.93747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12009","scoring_system":"epss","scoring_elements":"0.93757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93889","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93916","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12383","scoring_system":"epss","scoring_elements":"0.93918","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3450"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=845372","reference_id":"845372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=845372"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php","reference_id":"CVE-2012-3450;OSVDB-82931","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/37566.php"},{"reference_url":"https://www.securityfocus.com/bid/54777/info","reference_id":"CVE-2012-3450;OSVDB-82931","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54777/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://usn.ubuntu.com/1569-1/","reference_id":"USN-1569-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1569-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-3450"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-quge-cbz3-p7h2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49119?format=json","vulnerability_id":"VCID-vjm8-c1u4-wfab","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2336","reference_id":"","reference_type":"","scores":[{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47326","scoring_system":"epss","scoring_elements":"0.97702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.5291","scoring_system":"epss","scoring_elements":"0.97931","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2336"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=820708","reference_id":"820708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=820708"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1045","reference_id":"RHSA-2012:1045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"},{"reference_url":"https://usn.ubuntu.com/1481-1/","reference_id":"USN-1481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1481-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-2336"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjm8-c1u4-wfab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49108?format=json","vulnerability_id":"VCID-ytg7-b7vh-1ubw","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4566","reference_id":"","reference_type":"","scores":[{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.9716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97161","published_at":"2026-04-12T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97162","published_at":"2026-04-13T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.37102","scoring_system":"epss","scoring_elements":"0.97179","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=758413","reference_id":"758413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=758413"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0019","reference_id":"RHSA-2012:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0033","reference_id":"RHSA-2012:0033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0071","reference_id":"RHSA-2012:0071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0071"},{"reference_url":"https://usn.ubuntu.com/1307-1/","reference_id":"USN-1307-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1307-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2011-4566"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytg7-b7vh-1ubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49112?format=json","vulnerability_id":"VCID-zquc-69kh-yqdg","summary":"Multiple vulnerabilities were found in PHP, the worst of which lead\n    to remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0789","reference_id":"","reference_type":"","scores":[{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91945","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91964","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91985","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0779","scoring_system":"epss","scoring_elements":"0.91981","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783609","reference_id":"783609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783609"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php","reference_id":"CVE-2012-0789;OSVDB-79332","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/36789.php"},{"reference_url":"https://www.securityfocus.com/bid/52043/info","reference_id":"CVE-2012-0789;OSVDB-79332","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/52043/info"},{"reference_url":"https://security.gentoo.org/glsa/201209-03","reference_id":"GLSA-201209-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1045","reference_id":"RHSA-2012:1045","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1046","reference_id":"RHSA-2012:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1047","reference_id":"RHSA-2012:1047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1047"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77748?format=json","purl":"pkg:ebuild/dev-lang/php@5.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/77749?format=json","purl":"pkg:ebuild/dev-lang/php@5.4.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}],"aliases":["CVE-2012-0789"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zquc-69kh-yqdg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.4.5"}