{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40016?format=json","vulnerability_id":"VCID-h93k-zzy5-euhq","summary":"Multiple vulnerabilities have been identified, the worst of which allow\n    arbitrary code execution on a user's system via a malicious Flash file.","aliases":[{"alias":"CVE-2007-6243"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77798?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@9.0.115.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@9.0.115.0"},{"url":"http://public2.vulnerablecode.io/api/packages/75496?format=json","purl":"pkg:ebuild/www-plugins/adobe-flash@9.0.124.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-plugins/adobe-flash@9.0.124.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129515?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.115.0-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-chtn-448q-q3hp"},{"vulnerability":"VCID-dqaf-8bt4-e7b2"},{"vulnerability":"VCID-f971-akpw-13fc"},{"vulnerability":"VCID-gfv3-fdj9-n3cw"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-mr8s-u9e2-wuad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.115.0-1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129516?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.115.0-1?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-chtn-448q-q3hp"},{"vulnerability":"VCID-dqaf-8bt4-e7b2"},{"vulnerability":"VCID-f971-akpw-13fc"},{"vulnerability":"VCID-gfv3-fdj9-n3cw"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-mr8s-u9e2-wuad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.115.0-1%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/129514?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.115.0-1.el3.with?arch=oss","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-chtn-448q-q3hp"},{"vulnerability":"VCID-dqaf-8bt4-e7b2"},{"vulnerability":"VCID-f971-akpw-13fc"},{"vulnerability":"VCID-gfv3-fdj9-n3cw"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-mr8s-u9e2-wuad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.115.0-1.el3.with%3Farch=oss"},{"url":"http://public2.vulnerablecode.io/api/packages/129342?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129343?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/129341?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with?arch=oss","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4m2b-39k1-wych"},{"vulnerability":"VCID-5e4j-hfzx-97bz"},{"vulnerability":"VCID-9bdt-96j5-zqe5"},{"vulnerability":"VCID-anqw-yy8h-jbep"},{"vulnerability":"VCID-ce5k-bsw7-qyca"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-kvxn-7bp5-fuhp"},{"vulnerability":"VCID-vqyf-skpw-gqa5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with%3Farch=oss"},{"url":"http://public2.vulnerablecode.io/api/packages/128779?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.151.0-1?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1zpq-gs32-ubg6"},{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-51dm-n7tt-5qe5"},{"vulnerability":"VCID-6rcd-pqxw-dbhk"},{"vulnerability":"VCID-avg5-yvm3-5qar"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-j7bq-mz97-k7e3"},{"vulnerability":"VCID-jqxw-6npu-ykd1"},{"vulnerability":"VCID-jxu2-azw2-bbfs"},{"vulnerability":"VCID-ktjz-rbrw-nyhm"},{"vulnerability":"VCID-uh21-ps74-wyaq"},{"vulnerability":"VCID-ujwj-eby4-xfg4"},{"vulnerability":"VCID-yc7j-b5gb-jqe5"},{"vulnerability":"VCID-yzky-wqbj-2bh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.151.0-1%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/128781?format=json","purl":"pkg:rpm/redhat/flash-plugin@9.0.151.0-1.el3.with?arch=oss","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1zpq-gs32-ubg6"},{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-51dm-n7tt-5qe5"},{"vulnerability":"VCID-6rcd-pqxw-dbhk"},{"vulnerability":"VCID-avg5-yvm3-5qar"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-j7bq-mz97-k7e3"},{"vulnerability":"VCID-jqxw-6npu-ykd1"},{"vulnerability":"VCID-jxu2-azw2-bbfs"},{"vulnerability":"VCID-ktjz-rbrw-nyhm"},{"vulnerability":"VCID-uh21-ps74-wyaq"},{"vulnerability":"VCID-ujwj-eby4-xfg4"},{"vulnerability":"VCID-yc7j-b5gb-jqe5"},{"vulnerability":"VCID-yzky-wqbj-2bh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@9.0.151.0-1.el3.with%3Farch=oss"},{"url":"http://public2.vulnerablecode.io/api/packages/128780?format=json","purl":"pkg:rpm/redhat/flash-plugin@10.0.12.36-2?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1zpq-gs32-ubg6"},{"vulnerability":"VCID-2b8m-zcvw-sfa8"},{"vulnerability":"VCID-51dm-n7tt-5qe5"},{"vulnerability":"VCID-6rcd-pqxw-dbhk"},{"vulnerability":"VCID-avg5-yvm3-5qar"},{"vulnerability":"VCID-h93k-zzy5-euhq"},{"vulnerability":"VCID-j7bq-mz97-k7e3"},{"vulnerability":"VCID-jqxw-6npu-ykd1"},{"vulnerability":"VCID-jxu2-azw2-bbfs"},{"vulnerability":"VCID-ktjz-rbrw-nyhm"},{"vulnerability":"VCID-uh21-ps74-wyaq"},{"vulnerability":"VCID-ujwj-eby4-xfg4"},{"vulnerability":"VCID-yc7j-b5gb-jqe5"},{"vulnerability":"VCID-yzky-wqbj-2bh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/flash-plugin@10.0.12.36-2%3Farch=el5"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243","reference_id":"","reference_type":"","scores":[{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.9727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97275","published_at":"2026-04-24T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97278","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-05-09T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97298","published_at":"2026-05-11T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-05-12T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97311","published_at":"2026-05-14T12:55:00Z"},{"value":"0.38894","scoring_system":"epss","scoring_elements":"0.97312","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664","reference_id":"440664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=440664"},{"reference_url":"https://security.gentoo.org/glsa/200801-07","reference_id":"GLSA-200801-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-07"},{"reference_url":"https://security.gentoo.org/glsa/200804-21","reference_id":"GLSA-200804-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1126","reference_id":"RHSA-2007:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0221","reference_id":"RHSA-2008:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0945","reference_id":"RHSA-2008:0945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0980","reference_id":"RHSA-2008:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0980"}],"weaknesses":[{"cwe_id":79,"name":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","description":"The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.4","risk_score":0.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h93k-zzy5-euhq"}