Lookup for vulnerable packages by Package URL.

GET /api/packages/129343?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/129343?format=api",
    "purl": "pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el4",
    "type": "rpm",
    "namespace": "redhat",
    "name": "flash-plugin",
    "version": "9.0.124.0-1",
    "qualifiers": {
        "arch": "el4"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88493?format=api",
            "vulnerability_id": "VCID-4m2b-39k1-wych",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3872.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3872.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84349",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84168",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84182",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.842",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84222",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84229",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84247",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84238",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8426",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84261",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84266",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84291",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.843",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84305",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84324",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3872"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45713"
                },
                {
                    "reference_url": "http://taviso.decsystem.org/research.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://taviso.decsystem.org/research.html"
                },
                {
                    "reference_url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618334",
                    "reference_id": "1618334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618334"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3872",
                    "reference_id": "CVE-2008-3872",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3872"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-3872"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4m2b-39k1-wych"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40010?format=api",
            "vulnerability_id": "VCID-5e4j-hfzx-97bz",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5275.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5275.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97141",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97148",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97153",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97154",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97164",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97169",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9717",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97179",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97184",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97183",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97187",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97191",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.37246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97195",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5275"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=367501",
                    "reference_id": "367501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=367501"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200801-07",
                    "reference_id": "GLSA-200801-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200801-07"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1126",
                    "reference_id": "RHSA-2007:1126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-5275"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5e4j-hfzx-97bz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40014?format=api",
            "vulnerability_id": "VCID-9bdt-96j5-zqe5",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98511",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98515",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98519",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9852",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98522",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98528",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98529",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9853",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98534",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98535",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.66216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98538",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6019"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440683",
                    "reference_id": "440683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440683"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt",
                    "reference_id": "CVE-2007-6019;OSVDB-43979",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/28694/info",
                    "reference_id": "CVE-2007-6019;OSVDB-43979",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/28694/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-6019"
            ],
            "risk_score": 1.2,
            "exploitability": "2.0",
            "weighted_severity": "0.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bdt-96j5-zqe5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40020?format=api",
            "vulnerability_id": "VCID-anqw-yy8h-jbep",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96364",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96371",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96375",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96379",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96387",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96394",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96398",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96404",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96409",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9641",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96411",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96412",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96413",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96423",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.27257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96425",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1655"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440696",
                    "reference_id": "440696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440696"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1655"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anqw-yy8h-jbep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40018?format=api",
            "vulnerability_id": "VCID-ce5k-bsw7-qyca",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6637.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6637.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97198",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97204",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97209",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9722",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97221",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97225",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97226",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97234",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97239",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9724",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97242",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97247",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.38242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97252",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440666",
                    "reference_id": "440666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440666"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-6637"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce5k-bsw7-qyca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40016?format=api",
            "vulnerability_id": "VCID-h93k-zzy5-euhq",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97238",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97244",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9725",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97261",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97262",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9727",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97272",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97274",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97275",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97276",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97278",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97283",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.38894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97288",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6243"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664",
                    "reference_id": "440664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200801-07",
                    "reference_id": "GLSA-200801-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200801-07"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1126",
                    "reference_id": "RHSA-2007:1126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0945",
                    "reference_id": "RHSA-2008:0945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0945"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0980",
                    "reference_id": "RHSA-2008:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0980"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-6243"
            ],
            "risk_score": 0.2,
            "exploitability": "0.5",
            "weighted_severity": "0.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40006?format=api",
            "vulnerability_id": "VCID-kvxn-7bp5-fuhp",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9933",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99332",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99336",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9934",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99342",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99341",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.84672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99343",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440684",
                    "reference_id": "440684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440684"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-0071"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvxn-7bp5-fuhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40019?format=api",
            "vulnerability_id": "VCID-vqyf-skpw-gqa5",
            "summary": "Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1654.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1654.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96431",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96438",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96443",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96454",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96458",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96462",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96465",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96473",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96479",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9648",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96482",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96483",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96491",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.27914",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1654"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440698",
                    "reference_id": "440698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200804-21",
                    "reference_id": "GLSA-200804-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200804-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0221",
                    "reference_id": "RHSA-2008:0221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0221"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1654"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyf-skpw-gqa5"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.2",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el4"
}