Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-j3zk-dv2g-77cv
Summaryphp: potential exposure to Marvin attack via unsafe implementation of RSA decryption API
Aliases
0
alias CVE-2024-2408
Fixed_packages
0
url pkg:deb/debian/php8.2@8.2.18-1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.18-1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.18-1%3Fdistro=bookworm
1
url pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
purl pkg:deb/debian/php8.2@8.2.29-1~deb12u1?distro=bookworm
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/php8.2@8.2.29-1~deb12u1%3Fdistro=bookworm
Affected_packages
0
url pkg:rpm/redhat/openssl@1:1.1.1k-12?arch=el8_9
purl pkg:rpm/redhat/openssl@1:1.1.1k-12?arch=el8_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-j3zk-dv2g-77cv
1
vulnerability VCID-sn5k-3e59-7ba8
2
vulnerability VCID-vhkt-tbz6-wuf7
3
vulnerability VCID-xnhs-4v7t-p3hv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssl@1:1.1.1k-12%3Farch=el8_9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2408.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2408
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48874
published_at 2026-04-13T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.4887
published_at 2026-04-04T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48824
published_at 2026-04-07T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48878
published_at 2026-04-08T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48875
published_at 2026-04-09T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48891
published_at 2026-04-11T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2408
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270358
reference_id 2270358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270358
5
reference_url https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864
reference_id GHSA-hh26-4ppw-5864
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
reference_id PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
7
reference_url https://access.redhat.com/errata/RHSA-2023:7877
reference_id RHSA-2023:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7877
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
reference_id W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-14T13:58:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
Weaknesses
0
cwe_id 208
name Observable Timing Discrepancy
description Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
1
cwe_id 327
name Use of a Broken or Risky Cryptographic Algorithm
description The product uses a broken or risky cryptographic algorithm or protocol.
2
cwe_id 385
name Covert Timing Channel
description Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
Exploits
Severity_range_score5.9 - 5.9
Exploitability0.5
Weighted_severity5.3
Risk_score2.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-j3zk-dv2g-77cv