{"url":"http://public2.vulnerablecode.io/api/packages/129343?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el4","type":"rpm","namespace":"redhat","name":"flash-plugin","version":"9.0.124.0-1","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88493?format=json","vulnerability_id":"VCID-4m2b-39k1-wych","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3872","reference_id":"","reference_type":"","scores":[{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84381","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84247","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.8426","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84266","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84324","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84349","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84366","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02149","scoring_system":"epss","scoring_elements":"0.84364","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3872"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45713","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45713"},{"reference_url":"http://taviso.decsystem.org/research.html","reference_id":"","reference_type":"","scores":[],"url":"http://taviso.decsystem.org/research.html"},{"reference_url":"http://www.adobe.com/support/security/bulletins/apsb08-11.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.adobe.com/support/security/bulletins/apsb08-11.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618334","reference_id":"1618334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618334"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3872","reference_id":"CVE-2008-3872","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2008-3872"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4m2b-39k1-wych"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40010?format=json","vulnerability_id":"VCID-5e4j-hfzx-97bz","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5275.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5275.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5275","reference_id":"","reference_type":"","scores":[{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97141","published_at":"2026-04-01T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.9717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97177","published_at":"2026-04-16T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97191","published_at":"2026-05-05T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97195","published_at":"2026-05-07T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.972","published_at":"2026-05-09T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.97205","published_at":"2026-05-11T12:55:00Z"},{"value":"0.37246","scoring_system":"epss","scoring_elements":"0.9721","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5275"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=367501","reference_id":"367501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=367501"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2007-5275"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5e4j-hfzx-97bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40014?format=json","vulnerability_id":"VCID-9bdt-96j5-zqe5","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6019","reference_id":"","reference_type":"","scores":[{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.9852","published_at":"2026-04-09T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98528","published_at":"2026-04-16T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98529","published_at":"2026-04-18T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.9853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98538","published_at":"2026-05-07T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98541","published_at":"2026-05-12T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98539","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440683","reference_id":"440683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440683"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt","reference_id":"CVE-2007-6019;OSVDB-43979","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt"},{"reference_url":"https://www.securityfocus.com/bid/28694/info","reference_id":"CVE-2007-6019;OSVDB-43979","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28694/info"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2007-6019"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bdt-96j5-zqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40020?format=json","vulnerability_id":"VCID-anqw-yy8h-jbep","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1655","reference_id":"","reference_type":"","scores":[{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.9639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96404","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.9641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96412","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96431","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96434","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27257","scoring_system":"epss","scoring_elements":"0.96439","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1655"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440696","reference_id":"440696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440696"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2008-1655"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anqw-yy8h-jbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40018?format=json","vulnerability_id":"VCID-ce5k-bsw7-qyca","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6637","reference_id":"","reference_type":"","scores":[{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.9722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97239","published_at":"2026-04-24T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.9724","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97247","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97252","published_at":"2026-05-07T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97256","published_at":"2026-05-09T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97263","published_at":"2026-05-11T12:55:00Z"},{"value":"0.38242","scoring_system":"epss","scoring_elements":"0.97267","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440666","reference_id":"440666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440666"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2007-6637"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ce5k-bsw7-qyca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40016?format=json","vulnerability_id":"VCID-h93k-zzy5-euhq","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243","reference_id":"","reference_type":"","scores":[{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97275","published_at":"2026-04-24T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97278","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-05-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97298","published_at":"2026-05-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664","reference_id":"440664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"fixed_packages":[],"aliases":["CVE-2007-6243"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40006?format=json","vulnerability_id":"VCID-kvxn-7bp5-fuhp","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0071.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0071","reference_id":"","reference_type":"","scores":[{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.9933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99334","published_at":"2026-04-07T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.9934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99342","published_at":"2026-05-05T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99343","published_at":"2026-05-07T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99344","published_at":"2026-05-09T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99345","published_at":"2026-05-11T12:55:00Z"},{"value":"0.84672","scoring_system":"epss","scoring_elements":"0.99347","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440684","reference_id":"440684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440684"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2007-0071"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvxn-7bp5-fuhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40019?format=json","vulnerability_id":"VCID-vqyf-skpw-gqa5","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1654","reference_id":"","reference_type":"","scores":[{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96473","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96477","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96479","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.9648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96492","published_at":"2026-05-07T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96501","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27914","scoring_system":"epss","scoring_elements":"0.96506","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440698","reference_id":"440698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440698"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"fixed_packages":[],"aliases":["CVE-2008-1654"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyf-skpw-gqa5"}],"fixing_vulnerabilities":[],"risk_score":"4.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el4"}