Lookup for vulnerable packages by Package URL.

GET /api/packages/130023?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/130023?format=api",
    "purl": "pkg:rpm/redhat/php@5.1.4-1.el4s1?arch=4",
    "type": "rpm",
    "namespace": "redhat",
    "name": "php",
    "version": "5.1.4-1.el4s1",
    "qualifiers": {
        "arch": "4"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88844?format=api",
            "vulnerability_id": "VCID-2bcm-xg5v-kyaw",
            "summary": "gd: GIF handling buffer overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91011",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91025",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91034",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91046",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91061",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91085",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91101",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91099",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91094",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838",
                    "reference_id": "384838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384838"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841",
                    "reference_id": "384841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384841"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431568",
                    "reference_id": "431568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431568"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0669",
                    "reference_id": "RHSA-2006:0669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146",
                    "reference_id": "RHSA-2008:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0146"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/342-1/",
                    "reference_id": "USN-342-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/342-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4484"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bcm-xg5v-kyaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60040?format=api",
            "vulnerability_id": "VCID-5f2w-zvqm-mfbe",
            "summary": "PHP is vulnerable to an integer overflow potentially allowing the remote\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97277",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97282",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9729",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97294",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97295",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97303",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97306",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97308",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97309",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.39413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97311",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4812"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618205",
                    "reference_id": "1618205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618205"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/28760.php",
                    "reference_id": "CVE-2006-4812;OSVDB-29510",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/28760.php"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/20349/info",
                    "reference_id": "CVE-2006-4812;OSVDB-29510",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/20349/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200610-14",
                    "reference_id": "GLSA-200610-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200610-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0708",
                    "reference_id": "RHSA-2006:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0708"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/362-1/",
                    "reference_id": "USN-362-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/362-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4812"
            ],
            "risk_score": 0.8,
            "exploitability": "2.0",
            "weighted_severity": "0.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5f2w-zvqm-mfbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88835?format=api",
            "vulnerability_id": "VCID-gcsv-9daj-dfc8",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82478",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82492",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8251",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82533",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8254",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82558",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82554",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82589",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82611",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82621",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82627",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4485"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618187",
                    "reference_id": "1618187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618187"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/362-1/",
                    "reference_id": "USN-362-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/362-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4485"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcsv-9daj-dfc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88834?format=api",
            "vulnerability_id": "VCID-m23p-1fg5-xqe2",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4482.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4482.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88547",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88556",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88573",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88595",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88599",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88611",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88605",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88618",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88615",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88628",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88633",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88632",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4482"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618186",
                    "reference_id": "1618186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0669",
                    "reference_id": "RHSA-2006:0669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0682",
                    "reference_id": "RHSA-2006:0682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/342-1/",
                    "reference_id": "USN-342-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/342-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4482"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m23p-1fg5-xqe2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88832?format=api",
            "vulnerability_id": "VCID-nqjb-dpv9-bkex",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4486.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4486.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80866",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80875",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80898",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80895",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80923",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80932",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80925",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8096",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80961",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80963",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80983",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80992",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81003",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4486"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618188",
                    "reference_id": "1618188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0669",
                    "reference_id": "RHSA-2006:0669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0682",
                    "reference_id": "RHSA-2006:0682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/362-1/",
                    "reference_id": "USN-362-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/362-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4486"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqjb-dpv9-bkex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48882?format=api",
            "vulnerability_id": "VCID-p819-ynn1-u3ht",
            "summary": "PHP contains a function that, when used, could allow a remote attacker to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90519",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9054",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90551",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90566",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9056",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90577",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90575",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9059",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90586",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618174",
                    "reference_id": "1618174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618174"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-28",
                    "reference_id": "GLSA-200608-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-28"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/2193.php",
                    "reference_id": "OSVDB-28000;CVE-2006-4020;OSVDB-27824",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/2193.php"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0669",
                    "reference_id": "RHSA-2006:0669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0682",
                    "reference_id": "RHSA-2006:0682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0688",
                    "reference_id": "RHSA-2006:0688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0736",
                    "reference_id": "RHSA-2006:0736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0736"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/342-1/",
                    "reference_id": "USN-342-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/342-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-4020"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p819-ynn1-u3ht"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "0.8",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/php@5.1.4-1.el4s1%3Farch=4"
}