Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/php@8.0.30-2?arch=el9
Typerpm
Namespaceredhat
Namephp
Version8.0.30-2
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1re1-15w4-cqeq
vulnerability_id VCID-1re1-15w4-cqeq
summary php: Leak partial content of the heap through heap buffer over-read in mysqlnd
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
reference_id
reference_type
scores
0
value 0.00663
scoring_system epss
scoring_elements 0.71285
published_at 2026-05-07T12:55:00Z
1
value 0.00663
scoring_system epss
scoring_elements 0.71221
published_at 2026-04-18T12:55:00Z
2
value 0.00663
scoring_system epss
scoring_elements 0.71253
published_at 2026-04-24T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-26T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71263
published_at 2026-04-29T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71248
published_at 2026-05-05T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71121
published_at 2026-04-07T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.71163
published_at 2026-04-08T12:55:00Z
8
value 0.00663
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-09T12:55:00Z
9
value 0.00663
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-21T12:55:00Z
10
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-12T12:55:00Z
11
value 0.00663
scoring_system epss
scoring_elements 0.71169
published_at 2026-04-13T12:55:00Z
12
value 0.00663
scoring_system epss
scoring_elements 0.71215
published_at 2026-04-16T12:55:00Z
13
value 0.00681
scoring_system epss
scoring_elements 0.71566
published_at 2026-04-02T12:55:00Z
14
value 0.00681
scoring_system epss
scoring_elements 0.71584
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
reference_id 2327960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327960
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
reference_id GHSA-h35g-vwh6-m678
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-22T17:37:12Z/
url https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-8929
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1re1-15w4-cqeq
1
url VCID-341r-8amt-z7dr
vulnerability_id VCID-341r-8amt-z7dr
summary php: Configuring a proxy in a stream context might allow for CRLF injection in URIs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78635
published_at 2026-05-07T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-12T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78541
published_at 2026-04-18T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78538
published_at 2026-04-21T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-24T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-26T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78595
published_at 2026-04-29T12:55:00Z
7
value 0.01153
scoring_system epss
scoring_elements 0.78611
published_at 2026-05-05T12:55:00Z
8
value 0.01153
scoring_system epss
scoring_elements 0.78514
published_at 2026-04-13T12:55:00Z
9
value 0.01153
scoring_system epss
scoring_elements 0.78539
published_at 2026-04-11T12:55:00Z
10
value 0.01559
scoring_system epss
scoring_elements 0.81462
published_at 2026-04-08T12:55:00Z
11
value 0.01559
scoring_system epss
scoring_elements 0.81434
published_at 2026-04-07T12:55:00Z
12
value 0.02098
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-04T12:55:00Z
13
value 0.02098
scoring_system epss
scoring_elements 0.83996
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11234
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
reference_id 2328523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328523
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
reference_id GHSA-c5f2-jwm7-mmq2
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:39Z/
url https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-11234
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-341r-8amt-z7dr
2
url VCID-53h9-y2ns-jfh1
vulnerability_id VCID-53h9-y2ns-jfh1
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63689
published_at 2026-05-07T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63677
published_at 2026-04-26T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-29T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63646
published_at 2026-05-05T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63596
published_at 2026-04-02T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63581
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63633
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63649
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-24T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63616
published_at 2026-04-13T12:55:00Z
11
value 0.0045
scoring_system epss
scoring_elements 0.63653
published_at 2026-04-16T12:55:00Z
12
value 0.0045
scoring_system epss
scoring_elements 0.63662
published_at 2026-04-18T12:55:00Z
13
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8927
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
reference_id 2317051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317051
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
reference_id GHSA-94p6-54jq-9mwp
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:50:40Z/
url https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
aliases CVE-2024-8927
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53h9-y2ns-jfh1
3
url VCID-6g29-te13-kucu
vulnerability_id VCID-6g29-te13-kucu
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.75284
published_at 2026-05-07T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-26T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75247
published_at 2026-04-29T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75256
published_at 2026-05-05T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75127
published_at 2026-04-02T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75157
published_at 2026-04-04T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75134
published_at 2026-04-07T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75168
published_at 2026-04-13T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-12T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75202
published_at 2026-04-21T12:55:00Z
10
value 0.00868
scoring_system epss
scoring_elements 0.75206
published_at 2026-04-16T12:55:00Z
11
value 0.00868
scoring_system epss
scoring_elements 0.75212
published_at 2026-04-18T12:55:00Z
12
value 0.00868
scoring_system epss
scoring_elements 0.75239
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
reference_id 2317144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317144
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
reference_id GHSA-865w-9rf3-2wh5
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:47:58Z/
url https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
fixed_packages
aliases CVE-2024-9026
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g29-te13-kucu
4
url VCID-9byf-ymwr-eug8
vulnerability_id VCID-9byf-ymwr-eug8
summary php: Single byte overread with convert.quoted-printable-decode filter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72737
published_at 2026-05-07T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72719
published_at 2026-04-26T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72714
published_at 2026-04-29T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72707
published_at 2026-05-05T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-02T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.726
published_at 2026-04-04T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-07T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-08T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-09T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72651
published_at 2026-04-11T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-12T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72623
published_at 2026-04-13T12:55:00Z
12
value 0.00728
scoring_system epss
scoring_elements 0.72665
published_at 2026-04-16T12:55:00Z
13
value 0.00728
scoring_system epss
scoring_elements 0.72676
published_at 2026-04-18T12:55:00Z
14
value 0.00728
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-21T12:55:00Z
15
value 0.00728
scoring_system epss
scoring_elements 0.72709
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
reference_id 1088688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088688
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
reference_id 2328521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328521
6
reference_url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
reference_id GHSA-r977-prxv-hc43
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:59Z/
url https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
7
reference_url https://access.redhat.com/errata/RHSA-2025:15687
reference_id RHSA-2025:15687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15687
8
reference_url https://access.redhat.com/errata/RHSA-2025:4263
reference_id RHSA-2025:4263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4263
9
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
10
reference_url https://access.redhat.com/errata/RHSA-2025:7432
reference_id RHSA-2025:7432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7432
11
reference_url https://access.redhat.com/errata/RHSA-2026:2470
reference_id RHSA-2026:2470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2470
12
reference_url https://usn.ubuntu.com/7157-1/
reference_id USN-7157-1
reference_type
scores
url https://usn.ubuntu.com/7157-1/
13
reference_url https://usn.ubuntu.com/7157-3/
reference_id USN-7157-3
reference_type
scores
url https://usn.ubuntu.com/7157-3/
fixed_packages
aliases CVE-2024-11233
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9byf-ymwr-eug8
5
url VCID-dmvz-493v-mfdr
vulnerability_id VCID-dmvz-493v-mfdr
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3096.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-3096
reference_id
reference_type
scores
0
value 0.01069
scoring_system epss
scoring_elements 0.77852
published_at 2026-05-07T12:55:00Z
1
value 0.01069
scoring_system epss
scoring_elements 0.77724
published_at 2026-04-12T12:55:00Z
2
value 0.01069
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-13T12:55:00Z
3
value 0.01069
scoring_system epss
scoring_elements 0.7776
published_at 2026-04-16T12:55:00Z
4
value 0.01069
scoring_system epss
scoring_elements 0.77759
published_at 2026-04-18T12:55:00Z
5
value 0.01069
scoring_system epss
scoring_elements 0.77753
published_at 2026-04-21T12:55:00Z
6
value 0.01069
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-24T12:55:00Z
7
value 0.01069
scoring_system epss
scoring_elements 0.77794
published_at 2026-04-26T12:55:00Z
8
value 0.01069
scoring_system epss
scoring_elements 0.77809
published_at 2026-04-29T12:55:00Z
9
value 0.01069
scoring_system epss
scoring_elements 0.77822
published_at 2026-05-05T12:55:00Z
10
value 0.01069
scoring_system epss
scoring_elements 0.7767
published_at 2026-04-02T12:55:00Z
11
value 0.01069
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-04T12:55:00Z
12
value 0.01069
scoring_system epss
scoring_elements 0.7768
published_at 2026-04-07T12:55:00Z
13
value 0.01069
scoring_system epss
scoring_elements 0.77708
published_at 2026-04-08T12:55:00Z
14
value 0.01069
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-09T12:55:00Z
15
value 0.01069
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-3096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275061
reference_id 2275061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275061
9
reference_url https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
reference_id GHSA-h746-cjrr-wfmr
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
12
reference_url https://security.netapp.com/advisory/ntap-20240510-0010/
reference_id ntap-20240510-0010
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-29T15:14:15Z/
url https://security.netapp.com/advisory/ntap-20240510-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
14
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
15
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
16
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
17
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
18
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
19
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
aliases CVE-2024-3096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmvz-493v-mfdr
6
url VCID-dqb9-fgsz-rycp
vulnerability_id VCID-dqb9-fgsz-rycp
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2756.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2756
reference_id
reference_type
scores
0
value 0.07745
scoring_system epss
scoring_elements 0.91979
published_at 2026-05-07T12:55:00Z
1
value 0.07745
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-11T12:55:00Z
2
value 0.07745
scoring_system epss
scoring_elements 0.91944
published_at 2026-04-12T12:55:00Z
3
value 0.07745
scoring_system epss
scoring_elements 0.91941
published_at 2026-04-13T12:55:00Z
4
value 0.07745
scoring_system epss
scoring_elements 0.9196
published_at 2026-04-24T12:55:00Z
5
value 0.07745
scoring_system epss
scoring_elements 0.91957
published_at 2026-04-18T12:55:00Z
6
value 0.07745
scoring_system epss
scoring_elements 0.91955
published_at 2026-04-21T12:55:00Z
7
value 0.07745
scoring_system epss
scoring_elements 0.91958
published_at 2026-04-26T12:55:00Z
8
value 0.07745
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-29T12:55:00Z
9
value 0.07745
scoring_system epss
scoring_elements 0.91966
published_at 2026-05-05T12:55:00Z
10
value 0.07745
scoring_system epss
scoring_elements 0.91909
published_at 2026-04-02T12:55:00Z
11
value 0.07745
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-04T12:55:00Z
12
value 0.07745
scoring_system epss
scoring_elements 0.91923
published_at 2026-04-07T12:55:00Z
13
value 0.07745
scoring_system epss
scoring_elements 0.91936
published_at 2026-04-08T12:55:00Z
14
value 0.07745
scoring_system epss
scoring_elements 0.91942
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2756
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/04/12/11
reference_id 11
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url http://www.openwall.com/lists/oss-security/2024/04/12/11
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275058
reference_id 2275058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275058
9
reference_url https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
reference_id GHSA-wpj3-hf5j-x4v4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
10
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html
12
reference_url https://security.netapp.com/advisory/ntap-20240510-0008/
reference_id ntap-20240510-0008
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T17:19:19Z/
url https://security.netapp.com/advisory/ntap-20240510-0008/
13
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
14
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
15
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
16
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
17
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
18
reference_url https://usn.ubuntu.com/6757-1/
reference_id USN-6757-1
reference_type
scores
url https://usn.ubuntu.com/6757-1/
19
reference_url https://usn.ubuntu.com/6757-2/
reference_id USN-6757-2
reference_type
scores
url https://usn.ubuntu.com/6757-2/
fixed_packages
aliases CVE-2024-2756
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqb9-fgsz-rycp
7
url VCID-e16f-4ynx-fqb9
vulnerability_id VCID-e16f-4ynx-fqb9
summary Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
reference_id
reference_type
scores
0
value 0.03579
scoring_system epss
scoring_elements 0.87802
published_at 2026-05-07T12:55:00Z
1
value 0.03579
scoring_system epss
scoring_elements 0.87707
published_at 2026-04-04T12:55:00Z
2
value 0.03579
scoring_system epss
scoring_elements 0.87709
published_at 2026-04-07T12:55:00Z
3
value 0.03579
scoring_system epss
scoring_elements 0.8773
published_at 2026-04-08T12:55:00Z
4
value 0.03579
scoring_system epss
scoring_elements 0.87736
published_at 2026-04-09T12:55:00Z
5
value 0.03579
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-11T12:55:00Z
6
value 0.03579
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-12T12:55:00Z
7
value 0.03579
scoring_system epss
scoring_elements 0.87739
published_at 2026-04-13T12:55:00Z
8
value 0.03579
scoring_system epss
scoring_elements 0.87753
published_at 2026-04-18T12:55:00Z
9
value 0.03579
scoring_system epss
scoring_elements 0.87752
published_at 2026-04-21T12:55:00Z
10
value 0.03579
scoring_system epss
scoring_elements 0.87768
published_at 2026-04-24T12:55:00Z
11
value 0.03579
scoring_system epss
scoring_elements 0.87775
published_at 2026-04-26T12:55:00Z
12
value 0.03579
scoring_system epss
scoring_elements 0.87773
published_at 2026-04-29T12:55:00Z
13
value 0.03579
scoring_system epss
scoring_elements 0.87787
published_at 2026-05-05T12:55:00Z
14
value 0.03579
scoring_system epss
scoring_elements 0.87695
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/07/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url http://www.openwall.com/lists/oss-security/2024/06/07/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
reference_id 1072885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072885
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
reference_id 2291252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2291252
7
reference_url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
reference_id GHSA-w8qr-v226-r27w
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
8
reference_url https://security.gentoo.org/glsa/202408-32
reference_id GLSA-202408-32
reference_type
scores
url https://security.gentoo.org/glsa/202408-32
9
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html
10
reference_url https://security.netapp.com/advisory/ntap-20240726-0001/
reference_id ntap-20240726-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://security.netapp.com/advisory/ntap-20240726-0001/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
12
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
13
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
14
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
15
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
16
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
17
reference_url https://usn.ubuntu.com/6841-1/
reference_id USN-6841-1
reference_type
scores
url https://usn.ubuntu.com/6841-1/
18
reference_url https://usn.ubuntu.com/6841-2/
reference_id USN-6841-2
reference_type
scores
url https://usn.ubuntu.com/6841-2/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-10T19:55:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
fixed_packages
aliases CVE-2024-5458
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e16f-4ynx-fqb9
8
url VCID-v42g-pabn-yqe7
vulnerability_id VCID-v42g-pabn-yqe7
summary Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
reference_id
reference_type
scores
0
value 0.02395
scoring_system epss
scoring_elements 0.85132
published_at 2026-05-07T12:55:00Z
1
value 0.02395
scoring_system epss
scoring_elements 0.85094
published_at 2026-04-26T12:55:00Z
2
value 0.02395
scoring_system epss
scoring_elements 0.85092
published_at 2026-04-29T12:55:00Z
3
value 0.02395
scoring_system epss
scoring_elements 0.85107
published_at 2026-05-05T12:55:00Z
4
value 0.02395
scoring_system epss
scoring_elements 0.84978
published_at 2026-04-02T12:55:00Z
5
value 0.02395
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-04T12:55:00Z
6
value 0.02395
scoring_system epss
scoring_elements 0.85
published_at 2026-04-07T12:55:00Z
7
value 0.02395
scoring_system epss
scoring_elements 0.85022
published_at 2026-04-08T12:55:00Z
8
value 0.02395
scoring_system epss
scoring_elements 0.85029
published_at 2026-04-09T12:55:00Z
9
value 0.02395
scoring_system epss
scoring_elements 0.85045
published_at 2026-04-11T12:55:00Z
10
value 0.02395
scoring_system epss
scoring_elements 0.85044
published_at 2026-04-12T12:55:00Z
11
value 0.02395
scoring_system epss
scoring_elements 0.8504
published_at 2026-04-13T12:55:00Z
12
value 0.02395
scoring_system epss
scoring_elements 0.85061
published_at 2026-04-21T12:55:00Z
13
value 0.02395
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-18T12:55:00Z
14
value 0.02395
scoring_system epss
scoring_elements 0.85085
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
reference_id 2317049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317049
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
reference_id GHSA-9pqp-7h25-4f32
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T12:56:50Z/
url https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
6
reference_url https://security.gentoo.org/glsa/202501-11
reference_id GLSA-202501-11
reference_type
scores
url https://security.gentoo.org/glsa/202501-11
7
reference_url https://access.redhat.com/errata/RHSA-2024:10949
reference_id RHSA-2024:10949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10949
8
reference_url https://access.redhat.com/errata/RHSA-2024:10950
reference_id RHSA-2024:10950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10950
9
reference_url https://access.redhat.com/errata/RHSA-2024:10951
reference_id RHSA-2024:10951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10951
10
reference_url https://access.redhat.com/errata/RHSA-2024:10952
reference_id RHSA-2024:10952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10952
11
reference_url https://access.redhat.com/errata/RHSA-2025:7315
reference_id RHSA-2025:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7315
12
reference_url https://usn.ubuntu.com/7049-1/
reference_id USN-7049-1
reference_type
scores
url https://usn.ubuntu.com/7049-1/
13
reference_url https://usn.ubuntu.com/7049-2/
reference_id USN-7049-2
reference_type
scores
url https://usn.ubuntu.com/7049-2/
14
reference_url https://usn.ubuntu.com/7049-3/
reference_id USN-7049-3
reference_type
scores
url https://usn.ubuntu.com/7049-3/
fixed_packages
aliases CVE-2024-8925
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v42g-pabn-yqe7
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@8.0.30-2%3Farch=el9