Lookup for vulnerable packages by Package URL.

GET /api/packages/76017?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/76017?format=api",
    "purl": "pkg:ebuild/app-emulation/vmware-player@2.0.0.45731",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "vmware-player",
    "version": "2.0.0.45731",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "5.5.5.56455",
    "latest_non_vulnerable_version": "5.5.5.56455",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42287?format=api",
            "vulnerability_id": "VCID-2qxg-7r7z-eudf",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
                },
                {
                    "reference_url": "http://osvdb.org/37271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/37271"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22579",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2251",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22728",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22517",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22624",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22583",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25631"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25894",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25894"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26909"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27590"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27706"
                },
                {
                    "reference_url": "http://secunia.com/advisories/28319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/28319"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200711-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200711-23.xml"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11483"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-526.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-526.htm"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0465.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0465.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0555.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0555.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0737.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/3229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/3229"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618305",
                    "reference_id": "1618305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618305"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1716",
                    "reference_id": "CVE-2007-1716",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:M/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1716"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0465",
                    "reference_id": "RHSA-2007:0465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0465"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0555",
                    "reference_id": "RHSA-2007:0555",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0555"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0737",
                    "reference_id": "RHSA-2007:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0737"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-1716"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2qxg-7r7z-eudf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42274?format=api",
            "vulnerability_id": "VCID-6kea-7ug6-h3fe",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0813.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0813.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32856",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32986",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32843",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3292",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32923",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32885",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3286",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.329",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32878",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0813"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617301",
                    "reference_id": "1617301",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617301"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0465",
                    "reference_id": "RHSA-2007:0465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0465"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2004-0813"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kea-7ug6-h3fe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42279?format=api",
            "vulnerability_id": "VCID-6mb5-m5z3-abeg",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28257",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28327",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2837",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2816",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28226",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28269",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28273",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28171",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28184",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28167",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4600"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618198",
                    "reference_id": "1618198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618198"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0310",
                    "reference_id": "RHSA-2007:0310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0430",
                    "reference_id": "RHSA-2007:0430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0430"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2006-4600"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mb5-m5z3-abeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42276?format=api",
            "vulnerability_id": "VCID-7ubn-g4bj-4yaf",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82795",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82804",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82835",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82851",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82847",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82881",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3619"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=198912",
                    "reference_id": "198912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198912"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0220",
                    "reference_id": "RHSA-2007:0220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0473",
                    "reference_id": "RHSA-2007:0473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0473"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2006-3619"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ubn-g4bj-4yaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42292?format=api",
            "vulnerability_id": "VCID-8sx9-j67y-1bfe",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78689",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78695",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78726",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78733",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78741",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78765",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78739",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78767",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5617"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-5617"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sx9-j67y-1bfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42288?format=api",
            "vulnerability_id": "VCID-atmn-3d8u-r7aq",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59529",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59627",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59597",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59681",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59664",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59678",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59685",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4496"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/543-1/",
                    "reference_id": "USN-543-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/543-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-4496"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-atmn-3d8u-r7aq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42291?format=api",
            "vulnerability_id": "VCID-q3y6-q6tp-57hg",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58245",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58325",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58384",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5836",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58393",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58397",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4497"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/543-1/",
                    "reference_id": "USN-543-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/543-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-4497"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3y6-q6tp-57hg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42281?format=api",
            "vulnerability_id": "VCID-txaa-w4kx-vbbk",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0061.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0061.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9483",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94845",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94849",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94853",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94854",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94861",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.16318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94865",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0061"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/543-1/",
                    "reference_id": "USN-543-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/543-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-0061"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txaa-w4kx-vbbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42278?format=api",
            "vulnerability_id": "VCID-y4ak-gm1q-6fa1",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4146.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4146.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79348",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79354",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79377",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79389",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79406",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79426",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79424",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4146"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=203875",
                    "reference_id": "203875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203875"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0229",
                    "reference_id": "RHSA-2007:0229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0229"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0469",
                    "reference_id": "RHSA-2007:0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0469"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/356-1/",
                    "reference_id": "USN-356-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/356-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2006-4146"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ak-gm1q-6fa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42284?format=api",
            "vulnerability_id": "VCID-y4x4-xv6p-3yh8",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0063.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0063.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0063",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91814",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91819",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91851",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91847",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91867",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91863",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0063"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618264",
                    "reference_id": "1618264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618264"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0970",
                    "reference_id": "RHSA-2007:0970",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0970"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/543-1/",
                    "reference_id": "USN-543-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/543-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-0063"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x4-xv6p-3yh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42283?format=api",
            "vulnerability_id": "VCID-yq8s-1gez-r3cg",
            "summary": "VMware guest operating systems might be able to execute arbitrary code with\n    elevated privileges on the host operating system through multiple flaws.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0062.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0062.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90089",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90138",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90131",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90148",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0062"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=339561",
                    "reference_id": "339561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=339561"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-23",
                    "reference_id": "GLSA-200711-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-23"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200808-05",
                    "reference_id": "GLSA-200808-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200808-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/543-1/",
                    "reference_id": "USN-543-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/543-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76020?format=api",
                    "purl": "pkg:ebuild/app-emulation/vmware-player@5.5.5.56455",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@5.5.5.56455"
                }
            ],
            "aliases": [
                "CVE-2007-0062"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8s-1gez-r3cg"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "1.6",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-player@2.0.0.45731"
}