{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40973?format=json","vulnerability_id":"VCID-k9c3-pumr-xffr","summary":"PHP contains several vulnerabilities including a heap buffer overflow,\n    potentially leading to the remote execution of arbitrary code under certain\n    conditions.","aliases":[{"alias":"CVE-2007-0988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75579?format=json","purl":"pkg:ebuild/dev-lang/php@5.2.1-r3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.2.1-r3"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129922?format=json","purl":"pkg:rpm/redhat/php@4.1.2-2?arch=14","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41ca-da3r-aufr"},{"vulnerability":"VCID-51uw-rhq6-q3fx"},{"vulnerability":"VCID-58h4-t4ym-ybe7"},{"vulnerability":"VCID-9y94-qc58-hqdu"},{"vulnerability":"VCID-f32h-wt19-vqbc"},{"vulnerability":"VCID-k9c3-pumr-xffr"},{"vulnerability":"VCID-rfk2-yaxz-bqeu"},{"vulnerability":"VCID-tcu4-hqs3-vqcq"},{"vulnerability":"VCID-wrjc-wq1y-73ga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@4.1.2-2%3Farch=14"},{"url":"http://public2.vulnerablecode.io/api/packages/129923?format=json","purl":"pkg:rpm/redhat/php@4.3.2-39?arch=ent","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41ca-da3r-aufr"},{"vulnerability":"VCID-51uw-rhq6-q3fx"},{"vulnerability":"VCID-58h4-t4ym-ybe7"},{"vulnerability":"VCID-9y94-qc58-hqdu"},{"vulnerability":"VCID-f32h-wt19-vqbc"},{"vulnerability":"VCID-k9c3-pumr-xffr"},{"vulnerability":"VCID-rfk2-yaxz-bqeu"},{"vulnerability":"VCID-tcu4-hqs3-vqcq"},{"vulnerability":"VCID-wrjc-wq1y-73ga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@4.3.2-39%3Farch=ent"},{"url":"http://public2.vulnerablecode.io/api/packages/129924?format=json","purl":"pkg:rpm/redhat/php@4.3.9-3.22?arch=3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41ca-da3r-aufr"},{"vulnerability":"VCID-51uw-rhq6-q3fx"},{"vulnerability":"VCID-58h4-t4ym-ybe7"},{"vulnerability":"VCID-9y94-qc58-hqdu"},{"vulnerability":"VCID-f32h-wt19-vqbc"},{"vulnerability":"VCID-k9c3-pumr-xffr"},{"vulnerability":"VCID-rfk2-yaxz-bqeu"},{"vulnerability":"VCID-tcu4-hqs3-vqcq"},{"vulnerability":"VCID-wrjc-wq1y-73ga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@4.3.9-3.22%3Farch=3"},{"url":"http://public2.vulnerablecode.io/api/packages/129921?format=json","purl":"pkg:rpm/redhat/php@5.1.6-3.el4s1?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41ca-da3r-aufr"},{"vulnerability":"VCID-51uw-rhq6-q3fx"},{"vulnerability":"VCID-58h4-t4ym-ybe7"},{"vulnerability":"VCID-9y94-qc58-hqdu"},{"vulnerability":"VCID-f32h-wt19-vqbc"},{"vulnerability":"VCID-k9c3-pumr-xffr"},{"vulnerability":"VCID-rfk2-yaxz-bqeu"},{"vulnerability":"VCID-tcu4-hqs3-vqcq"},{"vulnerability":"VCID-wrjc-wq1y-73ga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.6-3.el4s1%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/129916?format=json","purl":"pkg:rpm/redhat/php@5.1.6-7?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41ca-da3r-aufr"},{"vulnerability":"VCID-51uw-rhq6-q3fx"},{"vulnerability":"VCID-58h4-t4ym-ybe7"},{"vulnerability":"VCID-9y94-qc58-hqdu"},{"vulnerability":"VCID-f32h-wt19-vqbc"},{"vulnerability":"VCID-k9c3-pumr-xffr"},{"vulnerability":"VCID-rfk2-yaxz-bqeu"},{"vulnerability":"VCID-tcu4-hqs3-vqcq"},{"vulnerability":"VCID-u2gv-h542-9bbt"},{"vulnerability":"VCID-wrjc-wq1y-73ga"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.6-7%3Farch=el5"}],"references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"},{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137"},{"reference_url":"http://osvdb.org/32762","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/32762"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0089.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0089.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0988.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0988","reference_id":"","reference_type":"","scores":[{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83338","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.8313","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83222","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83247","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83268","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83288","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83289","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83305","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0988"},{"reference_url":"http://secunia.com/advisories/24195","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24195"},{"reference_url":"http://secunia.com/advisories/24217","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24217"},{"reference_url":"http://secunia.com/advisories/24236","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24236"},{"reference_url":"http://secunia.com/advisories/24248","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24248"},{"reference_url":"http://secunia.com/advisories/24284","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24284"},{"reference_url":"http://secunia.com/advisories/24295","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24295"},{"reference_url":"http://secunia.com/advisories/24322","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24322"},{"reference_url":"http://secunia.com/advisories/24419","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24419"},{"reference_url":"http://secunia.com/advisories/24421","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24421"},{"reference_url":"http://secunia.com/advisories/24432","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24432"},{"reference_url":"http://secunia.com/advisories/24606","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24606"},{"reference_url":"http://secunia.com/advisories/24642","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24642"},{"reference_url":"http://secunia.com/advisories/25056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25056"},{"reference_url":"http://secunia.com/advisories/25423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25423"},{"reference_url":"http://secunia.com/advisories/25850","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25850"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-21.xml"},{"reference_url":"http://securityreason.com/securityalert/2315","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/2315"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32709","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32709"},{"reference_url":"https://issues.rpath.com/browse/RPL-1088","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1088"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11092","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11092"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:048","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:048"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_32_php.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_32_php.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html"},{"reference_url":"http://www.php.net/releases/5_2_1.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.php.net/releases/5_2_1.php"},{"reference_url":"http://www.php-security.org/MOPB/MOPB-05-2007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.php-security.org/MOPB/MOPB-05-2007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0076.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0076.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0081.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0081.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0082.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0082.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0088.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0088.html"},{"reference_url":"http://www.securityfocus.com/archive/1/461462/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/461462/100/0/threaded"},{"reference_url":"http://www.securitytracker.com/id?1017671","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017671"},{"reference_url":"http://www.trustix.org/errata/2007/0009/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0009/"},{"reference_url":"http://www.ubuntu.com/usn/usn-424-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-424-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-424-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-424-2"},{"reference_url":"http://www.us.debian.org/security/2007/dsa-1264","reference_id":"","reference_type":"","scores":[],"url":"http://www.us.debian.org/security/2007/dsa-1264"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1991","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1991"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2374","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2374"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618285","reference_id":"1618285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618285"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0988","reference_id":"CVE-2007-0988","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0988"},{"reference_url":"https://security.gentoo.org/glsa/200703-21","reference_id":"GLSA-200703-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0076","reference_id":"RHSA-2007:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0081","reference_id":"RHSA-2007:0081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0082","reference_id":"RHSA-2007:0082","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0088","reference_id":"RHSA-2007:0088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0088"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0089","reference_id":"RHSA-2007:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0089"},{"reference_url":"https://usn.ubuntu.com/424-1/","reference_id":"USN-424-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/424-1/"}],"weaknesses":[{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"4.3 - 4.3","exploitability":"0.5","weighted_severity":"3.9","risk_score":1.9,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9c3-pumr-xffr"}