Lookup for vulnerable packages by Package URL.

GET /api/packages/1036323?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1036323?format=api",
    "purl": "pkg:deb/debian/flightgear@0.7.9-3",
    "type": "deb",
    "namespace": "debian",
    "name": "flightgear",
    "version": "0.7.9-3",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1:2020.3.16+dfsg-1+deb12u1",
    "latest_non_vulnerable_version": "1:2020.3.16+dfsg-1+deb12u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93111?format=api",
            "vulnerability_id": "VCID-7q3y-2xqq-xyeb",
            "summary": "In FlightGear before version 2017.3.1, Main/logger.cxx in the FGLogger subsystem allows one to overwrite any file via a resource that affects the contents of the global Property Tree.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33382",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46749",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46697",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46751",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46691",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46746",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46754",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4681",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46774",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4673",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13709"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13709"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873439",
                    "reference_id": "873439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873439"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052166?format=api",
                    "purl": "pkg:deb/debian/flightgear@1:2018.3.2%2Bdfsg-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@1:2018.3.2%252Bdfsg-2"
                }
            ],
            "aliases": [
                "CVE-2017-13709"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7q3y-2xqq-xyeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45205?format=api",
            "vulnerability_id": "VCID-8tcp-1jww-k3f3",
            "summary": "Multiple vulnerabilities have been found in FlightGear and SimGear\n    allowing remote attackers to cause Denial of Service and possibly execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89049",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89057",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89075",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89093",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89098",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89105",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89103",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89114",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2090"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669024",
                    "reference_id": "669024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669024"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669025",
                    "reference_id": "669025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669025"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-12",
                    "reference_id": "GLSA-201603-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-12"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036329?format=api",
                    "purl": "pkg:deb/debian/flightgear@3.0.0-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7q3y-2xqq-xyeb"
                        },
                        {
                            "vulnerability": "VCID-9ewn-73tt-dbbp"
                        },
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        },
                        {
                            "vulnerability": "VCID-jvuk-8u9v-wyfy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@3.0.0-5"
                }
            ],
            "aliases": [
                "CVE-2012-2090"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8tcp-1jww-k3f3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93346?format=api",
            "vulnerability_id": "VCID-9ewn-73tt-dbbp",
            "summary": "In FlightGear before 2017.2.1, the FGCommand interface allows overwriting any file the user has write access to, but not with arbitrary data: only with the contents of a FlightGear flightplan (XML). A resource such as a malicious third-party aircraft could exploit this to damage files belonging to the user. Both this issue and CVE-2016-9956 are directory traversal vulnerabilities in Autopilot/route_mgr.cxx - this one exists because of an incomplete fix for CVE-2016-9956.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69074",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6909",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69143",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69162",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69183",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69168",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69139",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69179",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69187",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69167",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8921"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8921"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862689",
                    "reference_id": "862689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862689"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052165?format=api",
                    "purl": "pkg:deb/debian/flightgear@1:2016.4.4%2Bdfsg-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7q3y-2xqq-xyeb"
                        },
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@1:2016.4.4%252Bdfsg-3%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2017-8921"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ewn-73tt-dbbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96420?format=api",
            "vulnerability_id": "VCID-f7c9-mtg5-73d2",
            "summary": "An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12626",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12685",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12644",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12504",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12512",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12733",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12778",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12586",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12718",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0781"
                },
                {
                    "reference_url": "https://gitlab.com/flightgear/flightgear/-/issues/3025",
                    "reference_id": "3025",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-28T17:02:59Z/"
                        }
                    ],
                    "url": "https://gitlab.com/flightgear/flightgear/-/issues/3025"
                },
                {
                    "reference_url": "https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8",
                    "reference_id": "5bb023647114267141a7610e8f1ca7d6f4f5a5a8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-28T17:02:59Z/"
                        }
                    ],
                    "url": "https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8"
                },
                {
                    "reference_url": "https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358",
                    "reference_id": "ad37afce28083fad7f79467b3ffdead753584358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-28T17:02:59Z/"
                        }
                    ],
                    "url": "https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7965-1/",
                    "reference_id": "USN-7965-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7965-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1057394?format=api",
                    "purl": "pkg:deb/debian/flightgear@1:2020.3.16%2Bdfsg-1%2Bdeb12u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@1:2020.3.16%252Bdfsg-1%252Bdeb12u1"
                }
            ],
            "aliases": [
                "CVE-2025-0781"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f7c9-mtg5-73d2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82807?format=api",
            "vulnerability_id": "VCID-jvuk-8u9v-wyfy",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83118",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83131",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83129",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83162",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83178",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83167",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83204",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01886",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83208",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9956"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9956"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848114",
                    "reference_id": "848114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848114"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4588-1/",
                    "reference_id": "USN-4588-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4588-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036330?format=api",
                    "purl": "pkg:deb/debian/flightgear@3.0.0-5%2Bdeb8u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7q3y-2xqq-xyeb"
                        },
                        {
                            "vulnerability": "VCID-9ewn-73tt-dbbp"
                        },
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        },
                        {
                            "vulnerability": "VCID-jvuk-8u9v-wyfy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@3.0.0-5%252Bdeb8u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052165?format=api",
                    "purl": "pkg:deb/debian/flightgear@1:2016.4.4%2Bdfsg-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7q3y-2xqq-xyeb"
                        },
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@1:2016.4.4%252Bdfsg-3%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2016-9956"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvuk-8u9v-wyfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45213?format=api",
            "vulnerability_id": "VCID-sgqz-rav3-fufm",
            "summary": "Multiple vulnerabilities have been found in FlightGear and SimGear\n    allowing remote attackers to cause Denial of Service and possibly execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91789",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91797",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91811",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91824",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91831",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91834",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91832",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91852",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91849",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91848",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2091"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2091"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669024",
                    "reference_id": "669024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669024"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669025",
                    "reference_id": "669025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669025"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-12",
                    "reference_id": "GLSA-201603-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-12"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036329?format=api",
                    "purl": "pkg:deb/debian/flightgear@3.0.0-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7q3y-2xqq-xyeb"
                        },
                        {
                            "vulnerability": "VCID-9ewn-73tt-dbbp"
                        },
                        {
                            "vulnerability": "VCID-f7c9-mtg5-73d2"
                        },
                        {
                            "vulnerability": "VCID-jvuk-8u9v-wyfy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@3.0.0-5"
                }
            ],
            "aliases": [
                "CVE-2012-2091"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sgqz-rav3-fufm"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "3.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/flightgear@0.7.9-3"
}