Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/34078?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34078?format=api",
    "vulnerability_id": "VCID-74de-hcuq-5fdu",
    "summary": "A vulnerability in PHP might allow an attacker to execute arbitrary\n    code.",
    "aliases": [
        {
            "alias": "CVE-2019-11043"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371321?format=api",
            "purl": "pkg:alpm/archlinux/php@7.3.11-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.11-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986761?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=armhf&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=armhf&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986765?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=x86_64&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86_64&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986763?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=s390x&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=s390x&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986760?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=aarch64&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=aarch64&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986764?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=x86&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/986762?format=api",
            "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=ppc64le&distroversion=v3.7&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=ppc64le&distroversion=v3.7&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550930?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009085?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armv7&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armv7&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009086?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009088?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009087?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550927?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550928?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009083?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009089?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550929?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550932?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/550931?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.8&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.8&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1009084?format=api",
            "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.9&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.9&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984453?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992375?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554711?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984450?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985164?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992377?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992378?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992381?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554709?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992376?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985162?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013884?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013885?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013887?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504573?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504574?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504575?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504576?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504578?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504579?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554712?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554713?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984451?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984452?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504572?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/504577?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.13&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554710?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984454?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985163?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992379?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013886?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013889?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554714?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984455?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/554708?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.14&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.14&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/984456?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.10&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.10&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985161?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985165?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985166?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985167?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/985168?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.12&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.12&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/992380?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.15&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.15&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013883?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1013888?format=api",
            "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.11&reponame=community",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.11&reponame=community"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/73600?format=api",
            "purl": "pkg:ebuild/dev-lang/php@5.6.40-r7",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.40-r7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/73601?format=api",
            "purl": "pkg:ebuild/dev-lang/php@7.1.33",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.1.33"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/73602?format=api",
            "purl": "pkg:ebuild/dev-lang/php@7.2.24",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.24"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/73603?format=api",
            "purl": "pkg:ebuild/dev-lang/php@7.3.11",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.11"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371320?format=api",
            "purl": "pkg:alpm/archlinux/php@7.3.10-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.10-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104862?format=api",
            "purl": "pkg:rpm/redhat/php@5.3.3-50?arch=el6_10",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.3.3-50%3Farch=el6_10"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104857?format=api",
            "purl": "pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104861?format=api",
            "purl": "pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104860?format=api",
            "purl": "pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el6",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104858?format=api",
            "purl": "pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104863?format=api",
            "purl": "pkg:rpm/redhat/rh-php71-php@7.1.30-2?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php71-php@7.1.30-2%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/104859?format=api",
            "purl": "pkg:rpm/redhat/rh-php72-php@7.2.24-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1ap1-zugk-gbas"
                },
                {
                    "vulnerability": "VCID-2frx-71st-5qar"
                },
                {
                    "vulnerability": "VCID-4gxr-wh6g-bbbe"
                },
                {
                    "vulnerability": "VCID-6157-dume-sbcy"
                },
                {
                    "vulnerability": "VCID-6xda-97rd-9bam"
                },
                {
                    "vulnerability": "VCID-74de-hcuq-5fdu"
                },
                {
                    "vulnerability": "VCID-8kme-kjne-xubq"
                },
                {
                    "vulnerability": "VCID-aphr-wqxe-h3du"
                },
                {
                    "vulnerability": "VCID-c73c-1vw2-nfdf"
                },
                {
                    "vulnerability": "VCID-dhmd-y13e-t7hm"
                },
                {
                    "vulnerability": "VCID-g1b8-dkd3-j3a2"
                },
                {
                    "vulnerability": "VCID-nnxq-za85-73dk"
                },
                {
                    "vulnerability": "VCID-pn3v-35ge-fqa6"
                },
                {
                    "vulnerability": "VCID-qwh1-37ux-73h8"
                },
                {
                    "vulnerability": "VCID-rjc8-9tfv-sfdk"
                },
                {
                    "vulnerability": "VCID-sszm-mvm2-m7ee"
                },
                {
                    "vulnerability": "VCID-utwt-7gge-j7c7"
                },
                {
                    "vulnerability": "VCID-vh94-jp2p-zygp"
                },
                {
                    "vulnerability": "VCID-vtnn-62dq-yuee"
                },
                {
                    "vulnerability": "VCID-xg9z-qzsv-c7a6"
                },
                {
                    "vulnerability": "VCID-y1mr-3hx7-mfgc"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php72-php@7.2.24-1%3Farch=el7"
        }
    ],
    "references": [
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html"
        },
        {
            "reference_url": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html"
        },
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.1",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11043",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.94053",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99903",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.94053",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99902",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.94053",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99901",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.94062",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99902",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.94062",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99901",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.94062",
                    "scoring_system": "epss",
                    "scoring_elements": "0.99904",
                    "published_at": "2026-04-21T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11043"
        },
        {
            "reference_url": "https://bugs.php.net/bug.php?id=78599",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://bugs.php.net/bug.php?id=78599"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043"
        },
        {
            "reference_url": "http://seclists.org/fulldisclosure/2020/Jan/40",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "http://seclists.org/fulldisclosure/2020/Jan/40"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.1",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://github.com/neex/phuip-fpizdam",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://github.com/neex/phuip-fpizdam"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/"
        },
        {
            "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/"
        },
        {
            "reference_url": "https://seclists.org/bugtraq/2020/Jan/44",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://seclists.org/bugtraq/2020/Jan/44"
        },
        {
            "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0003/",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://security.netapp.com/advisory/ntap-20191031-0003/"
        },
        {
            "reference_url": "https://support.apple.com/kb/HT210919",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://support.apple.com/kb/HT210919"
        },
        {
            "reference_url": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS"
        },
        {
            "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043"
        },
        {
            "reference_url": "https://www.debian.org/security/2019/dsa-4552",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://www.debian.org/security/2019/dsa-4552"
        },
        {
            "reference_url": "https://www.debian.org/security/2019/dsa-4553",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://www.debian.org/security/2019/dsa-4553"
        },
        {
            "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_36",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://www.synology.com/security/advisory/Synology_SA_19_36"
        },
        {
            "reference_url": "https://www.tenable.com/security/tns-2021-14",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://www.tenable.com/security/tns-2021-14"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766378",
            "reference_id": "1766378",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766378"
        },
        {
            "reference_url": "https://security.archlinux.org/ASA-201910-14",
            "reference_id": "ASA-201910-14",
            "reference_type": "",
            "scores": [],
            "url": "https://security.archlinux.org/ASA-201910-14"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-1052",
            "reference_id": "AVG-1052",
            "reference_type": "",
            "scores": [
                {
                    "value": "Critical",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-1052"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f",
            "reference_id": "CVE-2019-11043",
            "reference_type": "exploit",
            "scores": [],
            "url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f"
        },
        {
            "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb",
            "reference_id": "CVE-2019-11043",
            "reference_type": "exploit",
            "scores": [],
            "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb"
        },
        {
            "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md",
            "reference_id": "CVE-2019-11043",
            "reference_type": "exploit",
            "scores": [],
            "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043",
            "reference_id": "CVE-2019-11043",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                },
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "9.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043"
        },
        {
            "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb",
            "reference_id": "CVE-2019-11043",
            "reference_type": "exploit",
            "scores": [],
            "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/201910-01",
            "reference_id": "GLSA-201910-01",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/201910-01"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3286",
            "reference_id": "RHSA-2019:3286",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3286"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3287",
            "reference_id": "RHSA-2019:3287",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3287"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299",
            "reference_id": "RHSA-2019:3299",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3299"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3300",
            "reference_id": "RHSA-2019:3300",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3300"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3724",
            "reference_id": "RHSA-2019:3724",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3724"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3735",
            "reference_id": "RHSA-2019:3735",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3735"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:3736",
            "reference_id": "RHSA-2019:3736",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3736"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2020:0322",
            "reference_id": "RHSA-2020:0322",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0322"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2020:2835",
            "reference_id": "RHSA-2020:2835",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2020:2835"
        },
        {
            "reference_url": "https://usn.ubuntu.com/4166-1/",
            "reference_id": "USN-4166-1",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://usn.ubuntu.com/4166-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/4166-2/",
            "reference_id": "USN-4166-2",
            "reference_type": "",
            "scores": [
                {
                    "value": "8.7",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                },
                {
                    "value": "Attend",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/"
                }
            ],
            "url": "https://usn.ubuntu.com/4166-2/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 787,
            "name": "Out-of-bounds Write",
            "description": "The product writes data past the end, or before the beginning, of the intended buffer."
        },
        {
            "cwe_id": 120,
            "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
            "description": "The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow."
        }
    ],
    "exploits": [
        {
            "date_added": "2019-10-28",
            "description": "PHP-FPM + Nginx - Remote Code Execution",
            "required_action": null,
            "due_date": null,
            "notes": null,
            "known_ransomware_campaign_use": false,
            "source_date_published": "2019-10-28",
            "exploit_type": "webapps",
            "platform": "php",
            "source_date_updated": "2019-10-28",
            "data_source": "Exploit-DB",
            "source_url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f"
        },
        {
            "date_added": null,
            "description": "This module exploits an underflow vulnerability in versions 7.1.x\n          below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 of PHP-FPM on\n          Nginx. Only servers with certains Nginx + PHP-FPM configurations are\n          exploitable. This is a port of the original neex's exploit code (see\n          refs.). First, it detects the correct parameters (Query String Length\n          and custom header length) needed to trigger code execution. This step\n          determines if the target is actually vulnerable (Check method). Then,\n          the exploit sets a series of PHP INI directives to create a file\n          locally on the target, which enables code execution through a query\n          string parameter. This is used to execute normal payload stagers.\n          Finally, this module does some cleanup by killing local PHP-FPM\n          workers (those are spawned automatically once killed) and removing\n          the created local file.",
            "required_action": null,
            "due_date": null,
            "notes": "Stability:\n  - crash-service-restarts\nReliability:\n  - repeatable-session\nSideEffects:\n  - artifacts-on-disk\n  - ioc-in-logs\n",
            "known_ransomware_campaign_use": false,
            "source_date_published": "2019-10-22",
            "exploit_type": null,
            "platform": "PHP,Unix",
            "source_date_updated": null,
            "data_source": "Metasploit",
            "source_url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/php_fpm_rce.rb"
        },
        {
            "date_added": "2022-03-25",
            "description": "In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.",
            "required_action": "Apply updates per vendor instructions.",
            "due_date": "2022-04-15",
            "notes": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043",
            "known_ransomware_campaign_use": true,
            "source_date_published": null,
            "exploit_type": null,
            "platform": null,
            "source_date_updated": null,
            "data_source": "KEV",
            "source_url": null
        }
    ],
    "severity_range_score": "7.5 - 10.0",
    "exploitability": "2.0",
    "weighted_severity": "9.0",
    "risk_score": 10.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74de-hcuq-5fdu"
}