{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40014?format=json","vulnerability_id":"VCID-9bdt-96j5-zqe5","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","aliases":[{"alias":"CVE-2007-6019"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75496?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@9.0.124.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@9.0.124.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129342?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129343?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/129341?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with?arch=oss","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with%3Farch=oss"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6019.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6019","reference_id":"","reference_type":"","scores":[{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.9852","published_at":"2026-04-09T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98528","published_at":"2026-04-16T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98529","published_at":"2026-04-18T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.9853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98538","published_at":"2026-05-07T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98541","published_at":"2026-05-16T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.66216","scoring_system":"epss","scoring_elements":"0.98545","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440683","reference_id":"440683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440683"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt","reference_id":"CVE-2007-6019;OSVDB-43979","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31630.txt"},{"reference_url":"https://www.securityfocus.com/bid/28694/info","reference_id":"CVE-2007-6019;OSVDB-43979","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28694/info"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[{"date_added":"2008-04-08","description":"Adobe Flash Player 8/9.0.x - '.SWF' File 'DeclareFunction2' ActionScript Tag Remote Code Execution","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2008-04-08","exploit_type":"remote","platform":"linux","source_date_updated":"2014-02-17","data_source":"Exploit-DB","source_url":"https://www.securityfocus.com/bid/28694/info"}],"severity_range_score":null,"exploitability":"2.0","weighted_severity":"0.6","risk_score":1.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bdt-96j5-zqe5"}