Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/34078?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34078?format=api", "vulnerability_id": "VCID-74de-hcuq-5fdu", "summary": "A vulnerability in PHP might allow an attacker to execute arbitrary\n code.", "aliases": [ { "alias": "CVE-2019-11043" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371321?format=api", "purl": "pkg:alpm/archlinux/php@7.3.11-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.11-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/986761?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=armhf&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=armhf&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/986765?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=x86_64&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86_64&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/986763?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=s390x&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=s390x&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/986760?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=aarch64&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=aarch64&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/986764?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=x86&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=x86&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/986762?format=api", "purl": "pkg:apk/alpine/php7@7.1.33-r0?arch=ppc64le&distroversion=v3.7&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.1.33-r0%3Farch=ppc64le&distroversion=v3.7&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550930?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009085?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armv7&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armv7&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009086?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009088?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009087?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=s390x&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=s390x&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550927?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550928?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009083?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=aarch64&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=aarch64&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009089?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550929?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=ppc64le&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=ppc64le&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550932?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/550931?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=x86&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=x86&distroversion=v3.8&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1009084?format=api", "purl": "pkg:apk/alpine/php7@7.2.24-r0?arch=armhf&distroversion=v3.9&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.2.24-r0%3Farch=armhf&distroversion=v3.9&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984453?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992375?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554711?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984450?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985164?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992377?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992378?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992381?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554709?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992376?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985162?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013884?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013885?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013887?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504573?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504574?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504575?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=mips64&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=mips64&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504576?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504578?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504579?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554712?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554713?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984451?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armhf&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armhf&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984452?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504572?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/504577?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.13&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554710?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984454?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985163?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=armv7&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=armv7&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992379?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013886?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013889?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554714?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984455?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/554708?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.14&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.14&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/984456?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985161?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985165?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=ppc64le&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985166?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=s390x&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=s390x&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985167?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/985168?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/992380?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.15&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013883?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=aarch64&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=aarch64&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/1013888?format=api", "purl": "pkg:apk/alpine/php7@7.3.11-r0?arch=x86&distroversion=v3.11&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/php7@7.3.11-r0%3Farch=x86&distroversion=v3.11&reponame=community" }, { "url": "http://public2.vulnerablecode.io/api/packages/73600?format=api", "purl": "pkg:ebuild/dev-lang/php@5.6.40-r7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.40-r7" }, { "url": "http://public2.vulnerablecode.io/api/packages/73601?format=api", "purl": "pkg:ebuild/dev-lang/php@7.1.33", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.1.33" }, { "url": "http://public2.vulnerablecode.io/api/packages/73602?format=api", "purl": "pkg:ebuild/dev-lang/php@7.2.24", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.2.24" }, { "url": "http://public2.vulnerablecode.io/api/packages/73603?format=api", "purl": "pkg:ebuild/dev-lang/php@7.3.11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.3.11" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371320?format=api", "purl": "pkg:alpm/archlinux/php@7.3.10-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/php@7.3.10-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/104862?format=api", "purl": "pkg:rpm/redhat/php@5.3.3-50?arch=el6_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.3.3-50%3Farch=el6_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/104857?format=api", "purl": "pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/104861?format=api", "purl": "pkg:rpm/redhat/php@5.4.16-46.1?arch=el7_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.4.16-46.1%3Farch=el7_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/104860?format=api", "purl": "pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/104858?format=api", "purl": "pkg:rpm/redhat/rh-php70-php@7.0.27-2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php70-php@7.0.27-2%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/104863?format=api", "purl": "pkg:rpm/redhat/rh-php71-php@7.1.30-2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-74de-hcuq-5fdu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php71-php@7.1.30-2%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/104859?format=api", "purl": "pkg:rpm/redhat/rh-php72-php@7.2.24-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ap1-zugk-gbas" }, { "vulnerability": "VCID-2frx-71st-5qar" }, { "vulnerability": "VCID-4gxr-wh6g-bbbe" }, { "vulnerability": "VCID-6157-dume-sbcy" }, { "vulnerability": "VCID-6xda-97rd-9bam" }, { "vulnerability": "VCID-74de-hcuq-5fdu" }, { "vulnerability": "VCID-8kme-kjne-xubq" }, { "vulnerability": "VCID-aphr-wqxe-h3du" }, { "vulnerability": "VCID-c73c-1vw2-nfdf" }, { "vulnerability": "VCID-dhmd-y13e-t7hm" }, { "vulnerability": "VCID-g1b8-dkd3-j3a2" }, { "vulnerability": "VCID-nnxq-za85-73dk" }, { "vulnerability": "VCID-pn3v-35ge-fqa6" }, { "vulnerability": "VCID-qwh1-37ux-73h8" }, { "vulnerability": "VCID-rjc8-9tfv-sfdk" }, { "vulnerability": "VCID-sszm-mvm2-m7ee" }, { "vulnerability": "VCID-utwt-7gge-j7c7" }, { "vulnerability": "VCID-vh94-jp2p-zygp" }, { "vulnerability": "VCID-vtnn-62dq-yuee" }, { "vulnerability": "VCID-xg9z-qzsv-c7a6" }, { "vulnerability": "VCID-y1mr-3hx7-mfgc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-php72-php@7.2.24-1%3Farch=el7" } ], "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html" }, { "reference_url": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11043.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11043", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94053", "scoring_system": "epss", "scoring_elements": "0.99903", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.94053", "scoring_system": "epss", "scoring_elements": "0.99902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.94053", "scoring_system": "epss", "scoring_elements": "0.99901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.94062", "scoring_system": "epss", "scoring_elements": "0.99902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.94062", "scoring_system": "epss", "scoring_elements": "0.99901", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.94062", "scoring_system": "epss", "scoring_elements": "0.99904", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11043" }, { "reference_url": "https://bugs.php.net/bug.php?id=78599", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://bugs.php.net/bug.php?id=78599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043" }, { "reference_url": "http://seclists.org/fulldisclosure/2020/Jan/40", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "http://seclists.org/fulldisclosure/2020/Jan/40" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/neex/phuip-fpizdam", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://github.com/neex/phuip-fpizdam" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/44", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://seclists.org/bugtraq/2020/Jan/44" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0003/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20191031-0003/" }, { "reference_url": "https://support.apple.com/kb/HT210919", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://support.apple.com/kb/HT210919" }, { "reference_url": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11043" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4552", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4552" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4553", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4553" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_19_36", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_36" }, { "reference_url": "https://www.tenable.com/security/tns-2021-14", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://www.tenable.com/security/tns-2021-14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766378", "reference_id": "1766378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766378" }, { "reference_url": "https://security.archlinux.org/ASA-201910-14", "reference_id": "ASA-201910-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201910-14" }, { "reference_url": "https://security.archlinux.org/AVG-1052", "reference_id": "AVG-1052", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1052" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f", "reference_id": "CVE-2019-11043", "reference_type": "exploit", "scores": [], "url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb", "reference_id": "CVE-2019-11043", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/48182.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md", "reference_id": "CVE-2019-11043", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47553.md" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043", "reference_id": "CVE-2019-11043", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb", "reference_id": "CVE-2019-11043", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_fpm_rce.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201910-01", "reference_id": "GLSA-201910-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201910-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3286", "reference_id": "RHSA-2019:3286", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3287", "reference_id": "RHSA-2019:3287", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3299", "reference_id": "RHSA-2019:3299", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3300", "reference_id": "RHSA-2019:3300", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3724", "reference_id": "RHSA-2019:3724", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3735", "reference_id": "RHSA-2019:3735", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3736", "reference_id": "RHSA-2019:3736", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:3736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0322", "reference_id": "RHSA-2020:0322", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2020:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2835", "reference_id": "RHSA-2020:2835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2835" }, { "reference_url": "https://usn.ubuntu.com/4166-1/", "reference_id": "USN-4166-1", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://usn.ubuntu.com/4166-1/" }, { "reference_url": "https://usn.ubuntu.com/4166-2/", "reference_id": "USN-4166-2", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:08:21Z/" } ], "url": "https://usn.ubuntu.com/4166-2/" } ], "weaknesses": [ { "cwe_id": 787, "name": "Out-of-bounds Write", "description": "The product writes data past the end, or before the beginning, of the intended buffer." }, { "cwe_id": 120, "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", "description": "The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow." } ], "exploits": [ { "date_added": "2019-10-28", "description": "PHP-FPM + Nginx - Remote Code Execution", "required_action": null, "due_date": null, "notes": null, "known_ransomware_campaign_use": false, "source_date_published": "2019-10-28", "exploit_type": "webapps", "platform": "php", "source_date_updated": "2019-10-28", "data_source": "Exploit-DB", "source_url": "https://github.com/neex/phuip-fpizdam/tree/8d12169a8c47be30677d1b97a402c42a9cf6b77f" }, { "date_added": null, "description": "This module exploits an underflow vulnerability in versions 7.1.x\n below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 of PHP-FPM on\n Nginx. Only servers with certains Nginx + PHP-FPM configurations are\n exploitable. This is a port of the original neex's exploit code (see\n refs.). First, it detects the correct parameters (Query String Length\n and custom header length) needed to trigger code execution. This step\n determines if the target is actually vulnerable (Check method). Then,\n the exploit sets a series of PHP INI directives to create a file\n locally on the target, which enables code execution through a query\n string parameter. This is used to execute normal payload stagers.\n Finally, this module does some cleanup by killing local PHP-FPM\n workers (those are spawned automatically once killed) and removing\n the created local file.", "required_action": null, "due_date": null, "notes": "Stability:\n - crash-service-restarts\nReliability:\n - repeatable-session\nSideEffects:\n - artifacts-on-disk\n - ioc-in-logs\n", "known_ransomware_campaign_use": false, "source_date_published": "2019-10-22", "exploit_type": null, "platform": "PHP,Unix", "source_date_updated": null, "data_source": "Metasploit", "source_url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/php_fpm_rce.rb" }, { "date_added": "2022-03-25", "description": "In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.", "required_action": "Apply updates per vendor instructions.", "due_date": "2022-04-15", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2019-11043", "known_ransomware_campaign_use": true, "source_date_published": null, "exploit_type": null, "platform": null, "source_date_updated": null, "data_source": "KEV", "source_url": null } ], "severity_range_score": "7.5 - 10.0", "exploitability": "2.0", "weighted_severity": "9.0", "risk_score": 10.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74de-hcuq-5fdu" }