Search for vulnerabilities
Vulnerability details: VCID-1het-59gj-pyew
Vulnerability ID VCID-1het-59gj-pyew
Aliases CVE-2024-11233
Summary In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
Status Published
Exploitability 0.5
Weighted Severity 7.4
Risk 3.7
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 4.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00151 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00168 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00182 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00189 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00197 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00213 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.0023 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.0023 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.0023 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.0023 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00236 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00263 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00263 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00263 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
epss 0.00648 https://api.first.org/data/v1/epss?cve=CVE-2024-11233
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4.8 https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
ssvc Track https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
cvssv3 8.2 https://nvd.nist.gov/vuln/detail/CVE-2024-11233
cvssv3.1 8.2 https://nvd.nist.gov/vuln/detail/CVE-2024-11233
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11233.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-24T12:32:59Z/ Found at https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-11233
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-11233
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.10366
EPSS Score 0.00043
Published At Nov. 24, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-11-20T01:19:09.662712+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/edge/community.json 34.3.2